Bitcoin Forum
May 05, 2024, 07:06:00 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: ASIC botnet: The new threat?  (Read 4230 times)
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
November 22, 2012, 02:45:28 PM
 #41

To date there have been 0 confirmed CPU botnets, 0 confirmed GPU botnets, and 0 confirmed FPGA botnets on bitcoin.
A smart GPU botnet would of course create a different account for each worker but that is sooooo much work, right? ;-)
I think a smart GPU botnet would setup a Bitcoin mining proxy or a mining pool.
1714892760
Hero Member
*
Offline Offline

Posts: 1714892760

View Profile Personal Message (Offline)

Ignore
1714892760
Reply with quote  #2

1714892760
Report to moderator
In order to achieve higher forum ranks, you need both activity points and merit points.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714892760
Hero Member
*
Offline Offline

Posts: 1714892760

View Profile Personal Message (Offline)

Ignore
1714892760
Reply with quote  #2

1714892760
Report to moderator
1714892760
Hero Member
*
Offline Offline

Posts: 1714892760

View Profile Personal Message (Offline)

Ignore
1714892760
Reply with quote  #2

1714892760
Report to moderator
SolarSilver
Legendary
*
Offline Offline

Activity: 1112
Merit: 1000


View Profile
November 22, 2012, 02:55:17 PM
 #42

Yes? Can you link something to evidence the frequent action pool operators take? Article or transcript from pool operators talking about it? I'm curious to learn about this.
To get accurate numbers, you would have to ask the question to Tycho. I was shown last week by a deepbit user when he logged in the banner "your account has been suspended due to illegal activity" (paraphrasing from memory here).

He said it happens automaticly once you have more than 150 different IPs connect to the same worker. (as it happened before)

There is a banner when you register that says "In case of illegal activity your account will be locked",
https://deepbit.net/register.php

With the amount of traffic deepbit sees, it would be hard to believe they have not automated some parts of the banning
bcpokey
Hero Member
*****
Offline Offline

Activity: 602
Merit: 500



View Profile
November 22, 2012, 05:30:28 PM
 #43

Yes? Can you link something to evidence the frequent action pool operators take? Article or transcript from pool operators talking about it? I'm curious to learn about this.
To get accurate numbers, you would have to ask the question to Tycho. I was shown last week by a deepbit user when he logged in the banner "your account has been suspended due to illegal activity" (paraphrasing from memory here).

He said it happens automaticly once you have more than 150 different IPs connect to the same worker. (as it happened before)

There is a banner when you register that says "In case of illegal activity your account will be locked",
https://deepbit.net/register.php

With the amount of traffic deepbit sees, it would be hard to believe they have not automated some parts of the banning

I'm not asking for accurate numbers, I'm asking for any confirmed botnet reports, and evidence as to them being GPU based, as you so casually stated that they were.

What you are telling me is that because an automated system on deepbit, which admittedly catches many regular users (unless you are suggesting your friend is a botnetter) by its aggressive settings, is the only suggestion that botnets "might be out there".

That is hardly conclusive evidence of the roving bands of GPU botnets you claim.

CPU botnets are the most likely, and even those are not very likely, nor clearly are they being very successful.
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
November 22, 2012, 05:38:23 PM
Last edit: November 22, 2012, 06:00:00 PM by 01BTC10
 #44

Yes? Can you link something to evidence the frequent action pool operators take? Article or transcript from pool operators talking about it? I'm curious to learn about this.
To get accurate numbers, you would have to ask the question to Tycho. I was shown last week by a deepbit user when he logged in the banner "your account has been suspended due to illegal activity" (paraphrasing from memory here).

He said it happens automaticly once you have more than 150 different IPs connect to the same worker. (as it happened before)

There is a banner when you register that says "In case of illegal activity your account will be locked",
https://deepbit.net/register.php

With the amount of traffic deepbit sees, it would be hard to believe they have not automated some parts of the banning

I'm not asking for accurate numbers, I'm asking for any confirmed botnet reports, and evidence as to them being GPU based, as you so casually stated that they were.

What you are telling me is that because an automated system on deepbit, which admittedly catches many regular users (unless you are suggesting your friend is a botnetter) by its aggressive settings, is the only suggestion that botnets "might be out there".

That is hardly conclusive evidence of the roving bands of GPU botnets you claim.

CPU botnets are the most likely, and even those are not very likely, nor clearly are they being very successful.

Maybe you missed those threads:

https://bitcointalk.org/index.php?topic=81356.0;all
https://bitcointalk.org/index.php?topic=67634.0

http://www.reddit.com/r/IAmA/comments/sq7cy/iama_a_malware_coder_and_botnet_operator_ama/
Quote
Q: How many botted machines do you typically gain per month or per campaign.
A: about 500-1000 a day, weekends more. I'm thinking about just buying them in bulks and milking them for bitcoins. Asian installs are very cheap, 15$/1000 installs and have good GPUs.

http://arstechnica.com/tech-policy/2011/08/symantec-spots-malware-that-uses-your-gpu-to-mine-bitcoins/
Quote
In contrast, the newest Bitcoin malware takes full advantage of the computing power on each compromised machine—including its GPU.

http://www.symantec.com/security_response/writeup.jsp?docid=2011-081115-5847-99&tabid=2
Quote
The Trojan will then run one of the following Bitcoin mining programs:
If a GPGPU-enabled graphics card is found, it runs Phoenix Miner.
Otherwise it runs RPC Miner.
SolarSilver
Legendary
*
Offline Offline

Activity: 1112
Merit: 1000


View Profile
November 22, 2012, 10:24:59 PM
 #45

What you are telling me is that because an automated system on deepbit, which admittedly catches many regular users (unless you are suggesting your friend is a botnetter) by its aggressive settings, is the only suggestion that botnets "might be out there".

I'm not suggesting he is a botnetter. I know he is a botnetter, he paid BTC 20 for the custom miner from a guy on Silk Road that installs itself on machines through a trojan horse and makes them into dedicated workers.

Quote
That is hardly conclusive evidence of the roving bands of GPU botnets you claim.

CPU botnets are the most likely, and even those are not very likely, nor clearly are they being very successful.
The people that run the botnets don't care if it's CPU or GPU, but they are more interested in harvesting good GPU machines. With most recent machines sporting some kind of GPU, they are actively being milked.

Check some of the stats individual people are getting on pools. A single individual that has 300 GH/s surely does not have all these machines in his own office.
Korbman
Legendary
*
Offline Offline

Activity: 1064
Merit: 1001



View Profile
November 22, 2012, 10:38:52 PM
 #46

I'm not suggesting he is a botnetter. I know he is a botnetter, he paid BTC 20 for the custom miner from a guy on Silk Road that installs itself on machines through a trojan horse and makes them into dedicated workers.

[...]

The people that run the botnets don't care if it's CPU or GPU, but they are more interested in harvesting good GPU machines. With most recent machines sporting some kind of GPU, they are actively being milked.

Check some of the stats individual people are getting on pools. A single individual that has 300 GH/s surely does not have all these machines in his own office.

Cool stuff. I wonder how sustainable the botnets actually are over time.

Even so, I don't think "botnetting" ASIC devices will be all that possible until the general public utilizes them daily (assuming it ever reaches that point). They're way too much of a niche device, tailored to a subset of the bitcoin community. To presume these botters are going to utilize ASICs attached to PCs undetected is a bit absurd....though not impossible.

bcpokey
Hero Member
*****
Offline Offline

Activity: 602
Merit: 500



View Profile
November 23, 2012, 10:59:38 PM
 #47

Yes? Can you link something to evidence the frequent action pool operators take? Article or transcript from pool operators talking about it? I'm curious to learn about this.
To get accurate numbers, you would have to ask the question to Tycho. I was shown last week by a deepbit user when he logged in the banner "your account has been suspended due to illegal activity" (paraphrasing from memory here).

He said it happens automaticly once you have more than 150 different IPs connect to the same worker. (as it happened before)

There is a banner when you register that says "In case of illegal activity your account will be locked",
https://deepbit.net/register.php

With the amount of traffic deepbit sees, it would be hard to believe they have not automated some parts of the banning

I'm not asking for accurate numbers, I'm asking for any confirmed botnet reports, and evidence as to them being GPU based, as you so casually stated that they were.

What you are telling me is that because an automated system on deepbit, which admittedly catches many regular users (unless you are suggesting your friend is a botnetter) by its aggressive settings, is the only suggestion that botnets "might be out there".

That is hardly conclusive evidence of the roving bands of GPU botnets you claim.

CPU botnets are the most likely, and even those are not very likely, nor clearly are they being very successful.

Maybe you missed those threads:

https://bitcointalk.org/index.php?topic=81356.0;all
https://bitcointalk.org/index.php?topic=67634.0

http://www.reddit.com/r/IAmA/comments/sq7cy/iama_a_malware_coder_and_botnet_operator_ama/
Quote
Q: How many botted machines do you typically gain per month or per campaign.
A: about 500-1000 a day, weekends more. I'm thinking about just buying them in bulks and milking them for bitcoins. Asian installs are very cheap, 15$/1000 installs and have good GPUs.

http://arstechnica.com/tech-policy/2011/08/symantec-spots-malware-that-uses-your-gpu-to-mine-bitcoins/
Quote
In contrast, the newest Bitcoin malware takes full advantage of the computing power on each compromised machine—including its GPU.

http://www.symantec.com/security_response/writeup.jsp?docid=2011-081115-5847-99&tabid=2
Quote
The Trojan will then run one of the following Bitcoin mining programs:
If a GPGPU-enabled graphics card is found, it runs Phoenix Miner.
Otherwise it runs RPC Miner.


Though I appreciate links, as I requested them (maybe you missed that post), neither of these fit any criteria of the quote.

Top line from The AMA post:

Quote
I operate a ~10k botnet using a ZeuS software I modified myself, including IRC, DDoS and bitcoin mining (13GH/s - 20GH/s atm).
20GH = 20,000 MH; 20,000 MH / 10,000comps = 2MH/comp. Or roughly what you'd get out of an old crappy CPU. I did say in the quote that CPU mining is most likely of the unlikely scenarios.

For the symantec stuff, GPU malware != GPU botnet. Simply is one, low-risk (hasn't spread much) example of code that has that ability. No one is claiming that it is impossible to do, that isn't what we're discussing, so this is not a useful link. If it were a report of how it was a widespread hidden threat that would make more sense.


As to the other guy with the botnetter friend, well. I will just leave that conversation be then.
Jaw3bmasters (OP)
Full Member
***
Offline Offline

Activity: 196
Merit: 100


Another block in the wall


View Profile
November 24, 2012, 12:36:53 PM
 #48

There's probably something like zeus for miners already out in the wild. What you're seeing isn't whats really there.

In Cryptography we trust.
legitnick
Hero Member
*****
Offline Offline

Activity: 532
Merit: 500



View Profile WWW
November 25, 2012, 02:28:57 AM
 #49

What if BFL/bASIC backdoors the ASIC's?  Shocked

5 BITCOIN RAFFLE GIVEAWAY
"I dont lift" - Lord Furrycoat
SolarSilver
Legendary
*
Offline Offline

Activity: 1112
Merit: 1000


View Profile
November 25, 2012, 11:16:11 AM
 #50

What if BFL/bASIC backdoors the ASIC's?  Shocked
in the case of bASIC, it would be easy to spot as the firmware will be released as open source. Same with Avalon.

In the case of a hardcoded backdoor into the hardware or BFL (closed source), traffic analysis would show other outgoing communication than the account you config (your own choice of pool or solo mining). Whoever makes the hardware has little control over where/how you deploy the hardware.
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!