- Unsupervised Learning
- Posts
- Criminals Using Compromised Desktops as a Hosting Fabric
Criminals Using Compromised Desktops as a Hosting Fabric
![mrbin-580x410](https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a88ec30b-9372-47e5-a041-d1d861517451/mrbin-580x410.png)
This is a fascinating article by Brian Krebs about how the new hotness is to host your malware site on a constantly rotating network of compromised hosts.
It’s almost like the evil version of BitTorrent, except people don’t know they’re participating.
I also love how the systems are in different countries, so it’s harder to get jurisdiction to clean them all up. And when a few do get taken offline they get replaced with new ones.
You basically have a queue of potential hosts that the malware automatically enrolls new victims in, and when it’s your turn it’s your turn.
Stopping malware sites like these has always been a whack-a-mole proposition, but this takes it to a new extreme.
As a security person I cannot help but be impressed.