A Case Study on Asprox Infection Dynamics

  • Authors:
  • Youngsang Shin;Steven Myers;Minaxi Gupta

  • Affiliations:
  • Computer Science Department, Indiana University, Bloomington;School of Informatics, Indiana University, Bloomington;Computer Science Department, Indiana University, Bloomington

  • Venue:
  • DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Asprox infection weaves a complex chain of dependencies involving bots that perform SQL injections on vulnerable web servers, and visitors whose machines get compromised simply by visiting infected websites. Using real-world data sets, we study Asprox bots, infected web servers, and the malicious infrastructure behind Asprox propagation. We find that the malware-propagation infrastructure in Asprox is aggressively provisioned to resist take-down efforts. This, combined with the easy availability of vulnerable user machines and web servers whose administrators are probably constrained in time and resources necessary to fix the problem, indicates that cleaning up Asprox infections is not going to be easy.