sint3k-bye
Bot networks are basically self replicating, or many of them are. You write a virus and infect a number of computers, those infect computers pass it on. Some viruses look email themselves to everyone in your email address book, others scan the local network for vuleranble computers and install themselves on those computers etc. A common case is some guy takes his laptop somewhere, it gets infect, he brings it back to work and then the virus attacks his work network.
So what Botherders do is infect a wave, let it spread, and just sit there. Once a computer is infect it connects to a specific server and listens for orders from the botherder, in this case sint3k. Sint3k likely never even checked to see what he hacked, rather all he did was know the rough size of his network and issue it commands.
These networks have value, they can used to send spam. Like sint3k may have told someone "If you pay me 10 grand I'll send out 1 million viagra emails" or some crap like that. In other cases they can be used to denial of service attacks.
One of the more famous attacks was a few Super Bowls ago some hackers called up a bunch of major gambling websites and said "Pay us X million or we'll shut you down over the SuperBowl". The websites told them to **** off. The week before the SuperBowl all these botnetworks (tens of thousands of computers) all had their computers start trying to load the gambling websites off and on. So like 10 thousand computers would try to load the website, then 10 seconds later 10 thousand more would, etc. It overloaded the servers, no one could log in and place bets, and those sites lost millions in potential revenue.
So yeah I'm curious as to how much sint3k made.
oshia86
Not to defend hackers, but they do prove a valuable role sometimes (albiet unknowingly). I work in a medical research hospital and we never have enough computing power for research projects (not enough money in the budget). So we used techinques developed by botherders to turn all the staff computers into a bot network. Those botherders had gotten really good at making viruses that were undetectable. They did their thing without lagging up the computer (if you lag up the computer people figure out they're infected and go get it fixed) and all that. I actually used a lot of 'hacker' code to make a 500+ node parallel cluster for processing neural signals. When the staff member is at their computer working it doesn't do anything, but it detects then the keyboard and mouse go idle and then starts hammering its way through data and sending the results to a server. So rather than send spam our network does medical research.
We also have some dedicated cluster servers for the heavy stuff.
im sure he will get what he has coming... no reason for him to get more or less...
The Best V8 Stories One Small Block at Time
seems he turned himself in to me.. i dont believe he was caught...
thats why i asked why he didnt just stop?
He was caught, he owes the Hospital 4500 for the expenses of their dumb a$$ IT team trying to figure out where all their bandwidth had gone.
He self surrendered, which means after his court date he was given a time to appear at a police station to be taken into custody. Self surrendering just means he showed up on time, and entered jail/prison like he was ordered to and didn't run form the law.
Also I agree that the hospital/government computer systems around this country are very easy to hack into and at risk for such an attack. All sint did was set up a botnet for fun, the bot worked well and continued to search out for more hosts to infect. A large computer network with no/little security, ie the hospital, would be an obvious choice for the bot to attack.
He was caught, he owes the Hospital 4500 for the expenses of their dumb a$$ IT team trying to figure out where all their bandwidth had gone.
He self surrendered, which means after his court date he was given a time to appear at a police station to be taken into custody. Self surrendering just means he showed up on time, and entered jail/prison like he was ordered to and didn't run form the law.
Also I agree that the hospital/government computer systems around this country are very easy to hack into and at risk for such an attack. All sint did was set up a botnet for fun, the bot worked well and continued to search out for more hosts to infect. A large computer network with no/little security, ie the hospital, would be an obvious choice for the bot to attack.
any personal gain he was getting from this?
He'll be paying for this long after he has done his 3 years in the can.
Lemons12 look at post #23 05CherryGXP listed a few ways you can make money with bot nets.


