posted on Oct, 1 2010 @ 02:35 PM
Originally posted by Ysterlong
reply to post by Returners
Basically my gist is that the command and control servers are meaningless as the command and control servers are too easy to take down, all the feds
have to do is make a call to the owner of the ip address and tell them to unplug the computer.
You seem to be knowledgeable in this field and this makes me wonder why they have not taken down the servers yet...... Too many questions here that
cannot be logically answered....
It has been taken down, the mal code was ridden of months ago.
I have explained it ALREADY
You cannot spread the botnet by P2P initially because you need a large group to make P2P effective.
Its the same concept as bittorent, in order to download something somebody else must have a piece, if the file is uncommon it could take your computer
years to complete it if your computer just ran around asking random computers if they have the second piece. (Of course this does not apply because
bittorrent has trackers so you know who has it and where it is instead of going around asking random people)
To spread a P2P botnet you need to set up servers intially to purposely spread it. When these servers get shut down the worm starts spreading by P2P.
Spreading a botnet by P2P is all RANDOM LUCK. If only a handful of computers in the world have Stuxnet working the odds of a computer getting the
decryption key from one of these are astronomically low because the initiator part of the worm just contacts computers randomly asking if they have
the decryption key for Stuxnet. Thats why a hacker needs to not only write the worm but they need to hack servers to purposely propagate it so that it
can get big enough to spread on its own.
These servers are the servers used to intially spread the virus, they have been shutdown ages ago. Any relations or links they have to the originator
are most likely non existant since they were most likely hacked in the first place.