Just as squatters move into ghost towns, sometimes we see protocol squatters join decentralized networks
eDonkey's "Overnet" was a decentralized p2p file sharing search. After eDonkey died, the Storm botnet started using Overnet to help spread its virus!https://twitter.com/ali01/status/956087244951052288 …
Protocol squatters take only what they need. Storm abused Overnet's feature for identifying who has a certain file. Instead, machines broadcast fake hashes that effectively say: > As of June 22nd 2018, I am a Storm infected machine. Connect to me! https://www.blackhat.com/presentations/bh-usa-08/Stewart/BH_US_08_Stewart_Protocols_of_the_Storm.pdf …pic.twitter.com/L0oo6YZ7mW
-
-
As another example, the Phatbot worm took advantage of the Gnutella network (Limework's protocol) and a decentralized protocol called WASTE to communicate and find peers. From the creator of the bot: https://news.ycombinator.com/item?id=4136951
Show this thread -
Indifferent network squatters are a nuisance for a protocol devs. For Overnet, the Storm botnet's usage is junk data being supported by legitimate Overnet users. Making things worse, white hat hackers then try to poison Overnet in order to stop Storm from spreading.pic.twitter.com/Hse18CeYBF
Show this thread
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.