Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1267))

Abstract

We focus on the problem of botnet orchestration and discuss how attackers can leverage decentralised technologies to dynamically control botnets with the goal of having botnets that are resilient against hostile takeovers. We cover critical elements of the Bitcoin blockchain and its usage for ‘floating command and control servers’. We further discuss how blockchain-based botnets can be built and include a detailed discussion of our implementation. We also showcase how specific Bitcoin APIs can be used in order to write extraneous data to the blockchain. Finally, while in this paper, we use Bitcoin to build our resilient botnet proof of concept, the threat is not limited to Bitcoin blockchain and can be generalized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/bitcoin/bitcoin.

  2. 2.

    https://bitcoin.org/en/p2p-network-guide.

References

  1. Ahmed, Z., Danish, S.M., Qureshi, H.K., Lestas, M.: Protecting IoTs from Mirai Botnet attacks using blockchains. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1–6. IEEE (2019)

    Google Scholar 

  2. Bistarelli, S., Mercanti, I., Santini, F.: An analysis of non-standard bitcoin transactions. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 93–96. IEEE (2018)

    Google Scholar 

  3. Kaminsky, D.: Black ops of TCP/IP (2011)

    Google Scholar 

  4. Kambourakis, G., Anagnostopoulos, M., Meng, W., Zhou, P.: Botnets: Architectures, Countermeasures, and Challenges. CRC Press, Boca Raton (2019)

    Book  Google Scholar 

  5. Ogu, E.C., Ojesanmi, O.A., Awodele, O., et al.: A Botnets circumspection: the current threat landscape, and what we know so far. Information 10(11), 337 (2019)

    Article  Google Scholar 

  6. Sagirlar, G., Carminati, B., Ferrari, E.: AutoBotCatcher: blockchain-based P2P botnet detection for the internet of things. In: 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), pp. 1–8. IEEE (2018)

    Google Scholar 

  7. Singh, M., Singh, M., Kaur, S.: Issues and challenges in DNS based botnet detection: a survey. Comput. Secur. 86, 28–52 (2019)

    Article  Google Scholar 

  8. Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your Botnet is my Botnet: analysis of a botnet takeover. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 635–647 (2009)

    Google Scholar 

  9. Trend Micro: Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions. Accessed 01 Feb 2020

    Google Scholar 

  10. Zohar, O.: Unblockable Chains – a POC on using blockchain as infrastructure for malware operations. Accessed 01 Feb 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitri Kamenski .

Editor information

Editors and Affiliations

Appendices

A Payload and Listener

figure a

B Calc.exe Launched from Meterpreter

figure b

C Dynamic Transport Connection

figure c

D Simple Block Explorer

figure d

E Full Node Block Explorer

figure e

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kamenski, D., Shaghaghi, A., Warren, M., Kanhere, S.S. (2021). Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies. In: Herrero, Á., Cambra, C., Urda, D., Sedano, J., Quintián, H., Corchado, E. (eds) 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). CISIS 2019. Advances in Intelligent Systems and Computing, vol 1267. Springer, Cham. https://doi.org/10.1007/978-3-030-57805-3_1

Download citation

Publish with us

Policies and ethics