Home Wordpress German Man Behind IRC-Managed WordPress Botnet

German Man Behind IRC-Managed WordPress Botnet

German Man Behind IRC-Managed WordPress Botnet

It is currently unknown how these websites are being compromised. In keeping with WordFence, a seller of security products for WordPress, the hacker works by adding a Php file with 25,000 lines of code to all websites he manages to advantage access. This document is a bot patron which connects to an IRC (Internet Relay Chat) server and listens to commands published inside the primary chat. Each time the botnet’s proprietor logs in and offers a command, all infected websites execute it.

While WordFence has not elaborated on the bot consumer’s technical talents, such botnets may be used to release DDoS attacks, brute-force assaults, insert Search engine optimization spam on the compromised web sites or send junk mail email from the underlying compromised servers.

“A 4-yr-vintage mystery resolved.”


The 25,000 bot client record contained configuration information and the IRC server’s IP cope with, port, and channel call (#1x33x7). Researchers observed what was in the botnet’s manipulate panel, which being an IRC chat room, allowed them to attach freely. After getting access to the IRC channel, WordFence researchers controlled to crack a protracted-lasting thriller: the botnet’s password. Study extra: http://news.Softpedia.Com/news/german-Man-In the back of-IRC-Managed-wordpress-botnet-507610.Shtml#ixzz4IQiKomV1

This precise botnet changed into secured with a hashed password string, allowing the botnet owner to authenticate every command they surpassed in the most important IRC chat room. Site owners who noticed their hacked websites frequently requested assistance in cracking this password but to no avail. A Google seeks exhibits requests as early as December 2012, which means the criminal’s botnet has been around for nearly four years. Due to the fact researchers had gotten right of entry to the main IRC window, they have got visible the criminal trouble out commands, and authenticating with the password in its cleartext model: 1x33x7.0wnz-you.************[REDACTED].

“Hunting down the botnet’s operator.”

In this equal chat room, researchers located a listing of infected websites, proven as the chat room’s customers, with technical details about the compromised platform as usernames. The listing of hacked websites protected the whole lot from Apache servers on FreeBSD to rarer instances of Home windows Server 2012 or Windows 8.

Related Articles : 

Additionally, within the person listing, they discovered debts belonging to the botnet’s grasp: LND-Bloodman and da-actual-LND. IRC chat rooms allow members to run primary “whois” instructions that screen information about other customers. Strolling a whois query for the criminal’s bills confirmed IP addresses and a probable electronic mail address containing the crook’s first call.

“Botnet operator is based totally in Germany.”

The IP address changed from Germany. The Bloodman account and the IRC channel’s name 1x33x7, additionally used by the attacker as an opportunity username, pointed investigators to diverse social media bills on Twitter, YouTube, and YouNow. This money owed showed that the criminal is a German-speakme Man. The further incriminating proof was observed on his YouTube channel; wherein he published a video where he bragged approximately his botnet. This video related his real lifestyle personality with the usernames used in the source code of the botnet’s purchaser document.

With the botnet’s password in hand and his real identity established, WordFence ought to now take down his botnet and report his criminal interest to German authorities. On its blog, in the comment fields, a WordFence spokesperson said it did now not notify the government approximately the botnet’s presence, especially Due to the fact it might be too time-eating for the employer. Furthermore, the Laptop Fraud and Abuse Act (CFAA) also prevents the employer from taking down the botnet without consent from authorities, so the botnet remains lively at the time of writing.