For those who wish to understand how a DDos attack works via a botnet see figure 1.
Figure 2 shows the evolution of DDos over recent years based upon purpose and size currently at 17+ Gbps (gigabytes per second) and potentially 7,000 such attacks daily - courtesy of Prolexic technologies (click on the figs to see full size and see links below).
These niche markets for the RBN are usually within the Internet market sectors of pornography, and specialized grey areas, e. g. online pharmaceuticals, and HYIP (High Yield Investment Programs). This blog is not commenting on the legitimate purpose or otherwise of these web sites, the RBN is successful as most of these webmasters are not about to publically complain. However it does appear that legitimate hosting services offering a level of DDos prevention are vulnerable to the RBN’s monopolistic efforts, to capture and control this high income business. It further appears many such recruits are then encouraged to mitigate the costs by becoming resellers themselves of the hosting and other RBN services. It should be added that some of these resellers are unaware, or are happy to be ignorant; they are actually part of the RBN reseller community.
For sample details we can start at a HYIP forum “Talkgold” this is a fascinating knock-about discussion on RBN DDos extortion (see link below) and provides some useful clues for RBN exposure.
The prime sales link for the RBN hosting is via NEAVE LIMITED a UK registered company, but the actual core serving is ELTEL based in St. Petersburg RU, one of the core replacement servers for the RBN post Nov 08, with AS-peers: 30 and 67,584 IP addresses. This is listed within Spamhaus (see link below) “Botnet criminal Indian & .ru/.ua spammer host: NEAVE LIMITED” as of Jan 12th 08.
Eltel: IP range 18.104.22.168 - 22.214.171.124 AS20597, example site hosting; goldenpiginvest.com /.net – the canadianmeds.com – pharmacy-viagra.net
Already some of the notable blacklisted domains listed within the Spamhaus lasso have moved to other RBN utilized AS servers, also using the RBN’s recent blocking avoidance mechanism “*.badsite.com” for sub domains for example:
rxpharmacy-support.com - ns3.cnmsn.com - 126.96.36.199 - 188.8.131.52/21 AKANOC Solutions Inc - AS 33314 (US)
*.thecanadianmeds.com - 184.108.40.206/19 Sistemnet Telecom - AS9121 TTNet (Turkey)
officialmedicines.com - 220.127.116.11-18.104.22.168 AS9121 TTNet (Turkey)
psxshop.com - 22.214.171.124/17 - AS29748 Carpathia Hosting
To further add and demonstrate RBN connectivity “goldenpiginvest.net” links directly to data storage on Level3 Communications; box(dot)net, - see figure 5 - a service that provides the ability to collaborate and share files online. This was shown in an earlier RBN blog article concerning 365fastcash and the RBN’s Panama based servers (see link below). No doubt Level 3 will be able to (again) inform US authorities of the content of these data files, and terminate such services.
Figure 6 – IP diagram for *.thecanadianmeds.com
Prolexic technologies - DDos information - figures 1 & 2
RBN DDos extortion Talkgold forum discussion
HotHYIPS forum RBN reseller advertising and remarks
Spamhaus botnet lasso - NEAVE LIMITED / Eltel, St. Petersburg RU
Level3 Communications; box(dot)net; goldenpiginvest.net & 365fastcash common linkages