Top 50 Bad Hosts and Networks 4Th Quarter 2010 - Report Table of Contents

Top 50 Bad Hosts and Networks 4Th Quarter 2010 - Report Table of Contents

HostExploit - January 2011 HostExploit’s Worldwide Cybercrime Series Top 50 Bad Hosts and Networks 4th Quarter 2010 - Report Table of Contents Foreword & Introduction Page 4 1. Editor’s Note Page 5 2. The Top 50 - Year-end 2010 Page 6 3. 2010 Q4 to Q3 Comparison Page 7 4. What’s New? Page 8 4. Top 10 Visual Breakdown Page 9 5. Country Analysis Page 10 6. The Good Hosts Page 11 7. Most Improved Hosts Page 12 8. Bad Hosts by Topic Page 13 8.1 Infected Web Sites Page 13 8.2 Spam Page 14 8.3 Botnet C&C Servers Page 15 8.4 Phishing Page 16 8.5 Exploit Servers Page 17 8.6 HostExploit Current Events Page 18 8.7 Botnet Hosting - Zeus Page 19 8.8 Badware Page 20 9. Crime Servers Page 21 10. Conclusions Page 22 Appendix 1 Glossary Page 23 Appendix 2 Methodology Page 25 Top Bad Hosts & Networks Q4 2010 Page 2 © HostExploit.com 2011 Top 50 CyberCrime Series Bad Hosts and Networks Edited by Comparative Data • Jart Armin • AA419 • MalwareList • Abuse.CH • MalwareURL Review • RashBL • Andre’ M. DiMino • CIDR • Robtex • Dr. Bob Bruen • Clean-MX.DE • Shadowserver • Albena Spasova • Emerging Threats • SiteVet • Raoul Chiesa • Google Safebrowsing • HostExploit • Spamhaus • hpHosts • StopBadware Contributors • ISC • SudoSecure • KnujOn • Sunbelt • Philip Stranger • MaliciousNetworks (FiRE) • Team Cymru • James McQuaid • MalwareDomains • UCE Protect • Steve Burn • David Glosser • Max Mockett • Brynd Thompson • Will Rogofsky Top Bad Hosts & Networks Q4 2010 Page 3 © HostExploit.com 2011 Top 50 CyberCrime Series Bad Hosts and Networks Foreword Introduction In recent years we have witnessed a large upward trend HostExploit presents the fourth quarter 2010 report in our in Internet criminal activity, particularly in the areas of ongoing series on the Top 50 Bad Hosts and Networks. malware distribution, spam, electronic fraud, and botnet related activities. A key data point in addressing this Analysis of 36,371 public ASes (Autonomous Systems), activity comes from the identification and tracking of the exchanging routing information with each other over the network and hosting service providers that facilitate these public Internet, provides the backbone for this research. criminal services. In some cases, it’s fairly easy to identify The resulting information has been analyzed using a unique the providers that facilitate these malicious activities, and combination of formulae and focuses on the worst aspects they are well known within the security community. In of cyber-criminal activity in order to create a bespoke other cases, it’s not very clear. Criminal gangs now often ‘badness’ rating. distribute their operations across multiple providers, thus building in resiliency and a higher availability. This takes into account the size of each network in question, recognizing that larger servers offer greater potential for The majority of network and hosting providers are very distributing malware, but also that such larger servers are concerned about their reputation and will respond in under more pressure to undertake effective monitoring. rapid fashion when notified of malicious activity. Others The result is an easily understandable measurement of are content to let such activities flourish. In any case, it is damage caused to internet users by ‘bad’ activity. We call important to highlight those providers where malicious this measurement the HE Index. activity is rampant, and raise general public awareness. For further details about the methodology behind the HE HostExploit’s Quarterly Top 50 report is an effort to do just Index, please refer to Appendix 2. that. This report is especially valuable in that it is not deriving opinion or statistics from few sources with limited visibility The security and wider internet community can play an into the wide range of criminal activity. It aggregates active role in calling for more stringent enforcement of and correlates the data and findings of many industry abuse policies. partners and researchers who specialize in these areas. The current threat landscape demands more collaboration The power of community action should not be and coordination among legitimate hosting providers, the underestimated, as illustrated in the recent exposure and security community, and law enforcement. It also demands demise of the malware serving host Troyak. shining a bright light on those locations that continue to Credit should be given where it is due, however, and we facilitate Internet criminal activity, without public scrutiny. whole-heartedly support the vast majority of hosting It is hoped that this latest HostExploit report serves not only providers who do a good job in keeping cybercriminals to meet these demands, but also to drive greater tracking at bay. For this reason we also highlight the ‘Top 10 Good and accountability of these hosts and networks as well as Hosts’, an accolade that I hope the qualifying hosts will their own upstream providers. appreciate when so much about security is given a negative perspective. Please note the quantitative analysis of each of the 36,371 Andre’ M. Di Mino ASes can be viewed daily on SiteVet.com Co-Founder & Director of The Shadowserver Foundation Jart Armin Top Bad Hosts & Networks Q4 2010 Page 4 © HostExploit.com 2011 1. CyberCrime Series Editor’s Note In December 2009, we introduced the HE Index as If these figures are not aimed at webmasters, at a numerical representation of the ‘badness’ of an whom are they targeted? Autonomous System (AS). Although generally well- received by the community, we have since received The reports are recommended reading for many constructive questions, some of which we will webmasters wanting to gain a vital understanding attempt to answer here. of what is happening in the world of information security beyond their daily lives. Our main goal, though, is to raise awareness about the source of security issues. The HE Index quantifies the extent to Why doesn’t the list show absolute badness instead which organizations allow illegal activities to occur - of proportional badness? or rather, fail to prevent it. A core characteristic of the index is that it is weighted by the size of the allocated address space of the AS, and for this reason it does not represent the total Why do these hosts allow this activity? bad activity that takes place on the AS. Statistics of total badness would, undoubtedly, be useful for It is important to state that by publishing these webmasters and system administrators who want to results, HostExploit does not claim that many of limit their routing traffic, but the HE Index is intended the hosting providers listed knowingly consent to to highlight security malpractice among many of the the illicit activity carried out on their servers. It is world’s internet hosting providers, which includes the important to consider many hosts are also victims of loose implementation of abuse regulations. cybercrime. Shouldn’t larger organizations be responsible for ------------------------------------------- re-investing profits in better security regulation? Further feedback is warmly welcomed The HE Index gives higher weighting to ASes with [email protected] smaller address spaces, but this relationship is not linear. We have used an “uncertainty factor” or Bayesian factor, to model this responsibility, which boosts figures for larger address spaces. The critical address size has been increased from 10,000 to 20,000 in this report to further enhance this effect. Top Bad Hosts & Networks Q4 2010 Page 5 © HostExploit.com 2011 HE Rank HE Index AS number AS name Country # of IPs 1 238.3 29106 VOLGAHOST-AS PE Bondarenko Dmitriy Vladimirovich RU 256 2 232.5 29073 ECATEL-AS AS29073, Ecatel Network NL 13,056 3 217.4 21740 ENOMAS1 - eNom, Incorporated US 12,288 4 192.1 10297 ENET-2 - eNET Inc. US 90,368 5 173.2 6849 UKRTELNET JSC UKRTELECOM, UA 1,119,744 6 170.2 39150 VLTELECOM-AS VLineTelecom LLC Moscow, Russia RU 5,888 7 168.2 6697 BELPAK-AS BELPAK BY 746,240 8 166.2 6851 BKCNET "SIA" IZZI LV 49,152 9 164.1 21844 THEPLANET-AS - ThePlanet.com Internet Services, Inc. US 1,673,728 10 164.1 16138 INTERIAPL INTERIA.PL Autonomous System PL 3,072 11 149.8 15244 ADDD2NET-COM-INC-DBA-LUNARPAGES - Lunar Pages US 44,544 12 149.0 16276 OVH OVH FR 411,392 13 148.9 4134 CHINANET-BACKBONE No.31,Jin-rong Street CN 106,110,208 14 147.4 36408 CDNETWORKS-GLOBAL unifi ed ASN for CDNetworks... US 35,328 15 144.8 28753 NETDIRECT AS NETDIRECT Frankfurt, DE DE 108,544 16 143.9 48876 INTERA-AS Takomi Ltd RU 512 17 143.5 46475 LIMESTONENETWORKS - Limestone Networks, Inc. US 57,344 18 138.3 24940 HETZNER-AS Hetzner Online AG RZ DE 445,440 19 137.4 32475 SINGLEHOP-INC - SingleHop US 197,632 20 134.1 18866 ATJEU - Atjeu Publishing LLC US 12,800 21 133.9 28299 CYBERWEB NETWORKS LTDA BR 17,408 22 133.7 31133 MF-MGSM-AS OJSC MegaFon Network RU 14,080 23 133.3 29629 INETWORK-AS IEUROP AS FR 8,192 24 132.5 21788 NOC - Network Operations Center Inc. US 278,528 25 132.3 32613 IWEB-AS - iWeb Technologies Inc. CA 218,112 26 131.5 39392 SUPERNETWORK-AS SuperNetwork s.r.o. CZ 34,048 27 131.2 36351 SOFTLAYER - SoftLayer Technologies Inc. US 658,176 The Top 50 Top The 28 129.8 15169 GOOGLE - Google Inc. US 265,984 29 128.1 41947 WEBALTA-AS OAO Webalta RU 13,824 2. 30 125.8 9829 BSNL-NIB National Internet Backbone IN 4,852,224 31 125.6 20564 INFORMEX-MNT Informex, E-commerce Service Provider UA 256 32 123.7 49087 TELOS-SOLUTIONS-AS Telos Solutions LTD LV 256 33 121.0 9809 NOVANET Nova Network Co.Ltd...Futian District, Shenzhen ,China CN 11,008 34 120.0 11798 ACEDATACENTERS-AS-1 - Ace Data Centers, Inc.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    28 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us