home / skills / plurigrid / asi / botnet-disruption

botnet-disruption skill

/skills/botnet-disruption

This skill helps authorized analysts disrupt botnets by mapping infrastructure, sinkholing domains, and coordinating lawful takedown actions across

npx playbooks add skill plurigrid/asi --skill botnet-disruption

Review the files below or copy the command above to add this skill to your agents.

Files (3)
SKILL.md
10.0 KB
---
name: botnet-disruption
description: Coordinated botnet takedown methodologies — sinkholing, infrastructure mapping, legal frameworks, BGP intervention, and post-disruption analysis. Studies Operation Endgame, Badbox 2.0, and emerging blockchain C2 countermeasures. Defensive disruption for authorized law enforcement, CERT, and academic research contexts.
version: 1.0.0
metadata:
  trit: +1
  color: "#30E030"
---

# Botnet Disruption: Coordinated Takedown Methodology

**Status**: Active
**Trit**: +1 (GENERATOR — produces disruption actions, countermeasures, takedown plans)
**Context**: Authorized law enforcement support, CERT coordination, academic research

---

## Disruption Taxonomy

| Method | Speed | Permanence | Legal Complexity | Scope |
|--------|-------|-----------|-----------------|-------|
| **DNS sinkholing** | Hours | Temporary (re-register) | Medium (registrar cooperation) | Domain-level |
| **Server seizure** | Days-weeks | Permanent per server | High (court orders, cross-jurisdiction) | Infrastructure |
| **BGP null-route** | Minutes | Temporary | Low (ISP cooperation) | IP prefix |
| **Coordinated takedown** | Months prep | Highly effective | Very high (multi-nation) | Ecosystem |
| **Demand-side prosecution** | Months-years | Deterrent | Very high | Customers |
| **Smart contract monitoring** | Continuous | Ongoing | Novel/untested | On-chain |

---

## DNS Sinkholing

### Methodology

```
1. Identify malicious domains (passive DNS, DGA prediction, threat intel)
2. Obtain authority (registrar cooperation, court order, registry action)
3. Redirect DNS records to defender-controlled sinkhole server
4. Capture bot connections for:
   - Victim enumeration (source IPs → notify affected orgs)
   - C2 protocol analysis (understand command structure)
   - Propagation mapping (which domains bots try next)
5. Maintain sinkhole (bots keep connecting until cleaned)
```

### Scale (2025)

**22.3 million domains sinkholed in 2025** (Disclosing.Observer passive DNS study).
13 distinct takedown bursts identified via Kleinberg's burst detection model.
Largest single event: Badbox 2.0 (April 10, 2025) — 5M+ subdomains.

### Post-Sinkhole Analysis

```
Historical A-records → hosting org identification
NS delegation patterns → infrastructure reuse detection
Subdomain generation patterns → automation fingerprinting
Shared subdomain labels → pivot across related C2 domains
```

---

## Coordinated Takedowns

### Operation Endgame (Template)

The defining multi-phase disruption of 2024-2026:

| Phase | Date | Targets | Results |
|-------|------|---------|---------|
| **Phase 1** | May 2024 | IcedID, Smokeloader, SystemBC, Pikabot, Bumblebee | 4 arrests, 100+ servers, 2000+ domains |
| **Phase 2** | April 2025 | Smokeloader *customers* (demand side) | 5 detentions, persona→identity via seized DB |
| **Phase 3** | Nov 2025 | Rhadamanthys, VenomRAT, Elysium | 1025+ servers, 20 domains, suspect arrested |

**Key innovation**: Database seizure → link online personas to real identities → prosecute demand side.
Phases separated by months. Each phase builds on intelligence from previous phase.

### Badbox 2.0 Takedown (April 2025)

- 10M Android devices pre-infected at factory
- Used as residential proxy network
- 5M+ subdomains sinkholed in single action
- Infrastructure distributed across Cloudflare, Amazon, Hostinger
- Detection: reused Cloudflare NS pairs across unrelated domains

### The Telnet Silence (Feb 10, 2025)

Global Telnet scanning traffic dropped 60%+ in a single day.
Cause debated: possible major undisclosed takedown, ISP intervention, or infrastructure failure.
Demonstrates achievable scale of disruption.

---

## BGP-Level Intervention

### Defensive BGP

```
ISP announces null-route for known C2 IP prefixes
→ traffic to C2 IPs drops into blackhole
→ bots cannot reach command infrastructure
```

### Counter-example: Root DNS Hijack (June 2025)

8 root DNS servers simultaneously BGP-hijacked (19:40-21:10 UTC).
3 hijacked prefixes had valid RPKI ROAs — attack succeeded because
downstream networks didn't implement Route Origin Validation (ROV).

**Lesson**: BGP security remains incomplete. RPKI+ROV deployment is necessary but insufficient.

---

## Legal Frameworks

### United States

| Statute | Application |
|---------|-------------|
| **18 U.S.C. §1030(a)(5)** (CFAA) | Criminalizes computer damage including botnet creation/operation |
| **FRCP 41(b)(6)(B)** | Search warrants for botnets affecting 5+ judicial districts |
| **18 U.S.C. §1345** | Civil injunctions for domain seizure (GameOver Zeus precedent) |

### International

| Framework | Scope | Parties |
|-----------|-------|---------|
| **Budapest Convention** | First cybercrime treaty | 81 ratifications (Aug 2025) |
| **Joint Investigation Teams** | Cross-border operations | Europol/Eurojust coordination |
| **MLAT** | Mutual Legal Assistance Treaty | Bilateral evidence sharing |

### Cross-Jurisdictional Challenges

- C2 servers in non-cooperative jurisdictions
- Bot population spans dozens of countries
- Evidence preservation during multi-month investigation
- Different legal standards for domain seizure across registries

---

## Blockchain C2 Countermeasures

### The Problem

```
Traditional: seize C2 server → botnet dies
Blockchain: C2 address stored in immutable smart contract
           → can't seize Ethereum
           → can't modify contract state
           → bots always find new C2 via on-chain read
```

### Countermeasures (Emerging)

| Approach | Mechanism | Limitation |
|----------|-----------|-----------|
| **RPC endpoint blocking** | Block bot access to public Ethereum RPC nodes | Bots can run own node |
| **Contract interaction monitoring** | Flag addresses querying known malicious contracts | Privacy tools (Tornado) obscure source |
| **Transaction graph analysis** | Trace operator's funding chain | Mixers/bridges break chain |
| **Validator-level censorship** | OFAC-compliant validators refuse to include malicious txs | Decentralization vs. censorship tension |
| **Honeypot contracts** | Deploy decoy contracts mimicking C2 pattern | Requires deep understanding of specific botnet |

### Game-Theoretic Frame

Blockchain C2 is a **mechanism design** problem:
- Operator pays gas fees → traceable funding chain
- Defender can front-run C2 updates with counter-updates (if contract allows)
- Economic cost of maintaining blockchain C2 > traditional C2
- Attacker/defender game on-chain becomes public and auditable

```scheme
;; Blockchain C2 defense as open game via Nashator
(define blockchain-c2-game
  (DSL.game "blockchain_c2_defense"
    (list (DSL.player "Operator" +1 3)   ; update/fund/rotate
          (DSL.player "Defender" -1 3))   ; monitor/front-run/trace
    blockchain-c2-payoffs))
```

---

## Disruption Pipeline (Operational)

### Phase 0: Intelligence Gathering

```
Passive DNS monitoring → DGA prediction → domain enumeration
Network telescope (darknet) → scan traffic analysis
Honeypot/honeynet → C2 protocol capture
MISP → aggregate threat intel from multiple sources
```

### Phase 1: Infrastructure Mapping

```
C2 domains → historical A-records → hosting providers
NS delegation → registrar identification
Whois/RDAP → registrant (often privacy-protected)
BGP origin → ASN → upstream provider
TLS certificates → certificate transparency logs → related domains
```

### Phase 2: Legal Authorization

```
Evidence compilation → search warrant application
Cross-jurisdiction coordination (Europol/FBI/NCA)
Domain seizure orders per jurisdiction
Hosting provider preservation orders
ISP traffic monitoring orders
```

### Phase 3: Coordinated Action

```
Simultaneous execution across all jurisdictions
DNS sinkholing + server seizure + BGP null-route
Operator infrastructure denied at all layers
Sinkhole server captures victim connections
```

### Phase 4: Post-Disruption

```
Victim notification (via sinkholed connections)
Database analysis (seized operational data)
Persona → identity linking (demand-side prosecution)
Public reporting + IOC sharing via MISP
Monitoring for reconstitution attempts
```

---

## Integration with Goblins Adapter

### Capability-Gated Disruption Tools

```scheme
;; Disruption tools as Goblins actors
;; Each tool requires explicit capability — no ambient authority

(define (^sinkhole-analyzer bcom dns-query-cap)
  "Analyze sinkhole traffic. Can ONLY query DNS — cannot modify."
  (methods
    [(analyze domain)
     ($ dns-query-cap resolve domain)]))

(define (^infrastructure-mapper bcom whois-cap ct-cap bgp-cap)
  "Map C2 infrastructure. Read-only capabilities only."
  (methods
    [(map-domain domain)
     (let ((whois (<- whois-cap lookup domain))
           (certs (<- ct-cap search domain))
           (bgp (<- bgp-cap origin domain)))
       ;; Promise pipeline: 3 queries, 1 RTT
       (list whois certs bgp))]))
```

### Fast Path (Zig)

DGA domain batch analysis at SIMD speed:
- Entropy computation: 10K domains in ~100μs
- Frequency analysis: character n-gram extraction vectorized
- Connects to fast-bridge.zig dispatch table

---

## GF(3) Triads

```
botnet-studies (-1) ⊗ blackhat-go (0) ⊗ botnet-disruption (+1) = 0 ✓  [Attack/Coord/Defend]
botnet-studies (-1) ⊗ network-forensics (0) ⊗ botnet-disruption (+1) = 0 ✓  [Analyze/Forensic/Disrupt]
reverse-engineering (-1) ⊗ captp (0) ⊗ botnet-disruption (+1) = 0 ✓  [RE/Transport/Disrupt]
counter-surveillance (-1) ⊗ nashator (0) ⊗ botnet-disruption (+1) = 0 ✓  [Surveil/Equilib/Disrupt]
botnet-studies (-1) ⊗ botnet-disruption (+1) ⊗ nashator (0) = 0 ✓  [Study/Disrupt/Balance]
```

---

## References

- Operation Endgame: europol.europa.eu (Phases 1-3, May 2024 → Nov 2025)
- Disclosing.Observer: 22.3M domains sinkholed (2025 passive DNS study)
- Badbox 2.0: HUMAN Security takedown report (April 2025)
- Budapest Convention on Cybercrime: 81 ratifications
- Tsundere botnet: Ethereum smart contract C2 (OffSeq threat radar)
- BGP root DNS hijack: Qrator Labs analysis (June 2025)
- FlipIt + MARL for MTD: ScienceDirect/TechScience (2025)
- 18 U.S.C. §1030, §1345: Congressional Research Service LSB11165

Overview

This skill describes coordinated botnet disruption methodologies for authorized defenders, law enforcement, CERTs, and academic researchers. It covers sinkholing, infrastructure mapping, BGP interventions, legal frameworks, and post-disruption analysis with concrete examples like Operation Endgame and Badbox 2.0. The content emphasizes operational pipelines and emerging challenges such as blockchain-based C2.

How this skill works

The skill walks through an operational disruption pipeline: intelligence gathering, infrastructure mapping, legal authorization, coordinated takedown actions (DNS sinkholing, server seizure, BGP null-routing), and post-disruption victim notification and analysis. It documents specific techniques for capturing bot connections, tracing hosting and BGP origins, and handling on-chain C2 mechanisms. Legal and cross-jurisdictional considerations are integrated into action planning to ensure authorized, defensible operations.

When to use it

  • When supporting authorized takedowns coordinated with law enforcement or CERTs
  • To plan multi-jurisdictional disruption campaigns against persistent C2 infrastructures
  • When analyzing large-scale sinkhole opportunities or measuring takedown impact
  • To design mitigations for blockchain-based command-and-control channels
  • For academic research that requires operationally realistic disruption templates

Best practices

  • Collect exhaustive passive DNS, darknet, and honeypot telemetry before action
  • Map registrar, NS delegation, BGP origin, and certificate data to avoid collateral damage
  • Obtain clear legal authorization and coordinate simultaneous actions across jurisdictions
  • Use sinkholes to enumerate victims and preserve forensic evidence for prosecutions
  • Monitor for reconstitution and share IOCs through trusted channels (MISP)

Example use cases

  • DNS sinkholing a large DGA-generated domain set to enumerate infected hosts and collect C2 protocol samples
  • Coordinated multi-country seizure and BGP null-routing to deny operator infrastructure across layers
  • Post-seizure database analysis to link online personas to real identities for demand-side prosecutions
  • Targeting blockchain C2 by monitoring contract interactions, tracing funding, and deploying honeypot contracts
  • Short-term ISP null-route to immediately disrupt active C2 while legal processes progress

FAQ

Is this guidance suitable for private companies?

Only for authorized actions; private entities should coordinate with law enforcement or CERTs and avoid unilateral disruption that may be illegal or cause collateral harm.

Can blockchain C2 be fully neutralized?

Not easily; defenders can raise economic costs and monitor on-chain activity, but immutable contracts and decentralized infrastructure require tailored strategies like RPC blocking, front-running updates, and transaction graph analysis.