Botnet Spam Infrastructure
When open relays closed, spammers built armies of compromised home computers to send spam; each bot sends small volumes, making blocking nearly impossible.
Timeline: The Cat and Mouse
2003 β Attack emerges β 2008 β Industry responds β 2011 β Botnets decline β Limited
The Evolution
| Phase | Period | What Happened |
|---|---|---|
| CONTEXT | 2000 | Open mail relays blacklisted; spammers need new delivery |
| ATTACK | 2003 | Sobig - first major spam botnet proves concept |
| PEAK | 2007 | Storm Worm: P2P architecture, 20% of global spam |
| Β | 2008 | Srizbi: 60B emails/day; McColo takedown drops spam 75% |
| RESPONSE | 2008 | McColo hosting provider takedown |
| Β | 2010 | ISPs block residential port 25 globally |
| Β | 2011 | Microsoft/FBI Rustock takedown (40B emails/day stopped) |
| DECLINE | 2012+ | Major botnets disrupted; spam shifts to compromised accounts |
Key Events with Sources
| Date | Event | Significance | Source |
|---|---|---|---|
| 2003 | Sobig botnet | First major spam botnet; ~100K bots | Symantec |
| Jan 2007 | Storm Worm peaks | P2P botnet; 1-50M infections estimated | Wikipedia |
| Nov 2008 | McColo takedown | Hosting provider cut off; global spam drops 75% overnight | Washington Post |
| Mar 2011 | Rustock takedown | Microsoft/FBI seize C2; 40B emails/day stopped | FBI |
| Jul 2012 | Grum takedown | Coordinated effort; 18% of global spam eliminated | Spamhaus |
Overview
When blacklists made open mail relays unusable, spammers needed a new delivery mechanism. The solution: malware that turned hundreds of thousands of home computers into spam-sending robots. Each infected machine sent only a few emails, but together they could deliver billions of messages daily. This distributed approach made traditional IP blocking nearly useless.
The Attack
Why Botnets Emerged
Open Relay Era (Pre-2003):
Spammer β Open Relay β Millions of victims
β
Gets blacklisted β Find new relay
Problem: Relays got blacklisted; finite supply of open relays.
Botnet Era (2003+):
Spammer β 500,000 infected home PCs β Millions of victims
β
Each sends 50 emails β Hard to blacklist all
Advantage: Residential IPs, distributed sending, self-replenishing supply.
Botnet Architecture
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Botnet Operator β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
Command & Control
β
ββββββββββββββββββββΌβββββββββββββββββββ
βΌ βΌ βΌ
βββββββββββ βββββββββββ βββββββββββ
β Bot 1 β β Bot 2 β β Bot ... β
β (Home β β (Home β β (500K β
β PC) β β PC) β β total) β
ββββββ¬βββββ ββββββ¬βββββ ββββββ¬βββββ
β β β
Sends 50 emails Sends 50 emails Sends 50 emails
β β β
ββββββββββββββββββββ΄βββββββββββββββββββ
β
25 million emails/day
Major Spam Botnets (Chronological)
Sobig (2003)
- Innovation: First major spam botnet
- Scale: ~100,000 infected machines
- Impact: Demonstrated botnet viability for spam
Storm Worm (2007-2008)
- Innovation: Peer-to-peer C2 (no central server to take down)
- Scale: ~1-50 million infected machines (estimates vary)
- Spam Volume: 20% of global spam at peak
- Delivery: Email attachments, drive-by downloads
Storm Worm P2P Architecture:
No central C2 server - bots communicate with each other
Take down one node β others continue operating
Bot A ββ Bot B ββ Bot C
β β β
ββββββ Bot D ββββββββ
Srizbi (2007-2008)
- Innovation: Kernel-mode rootkit for stealth
- Scale: ~450,000 bots
- Spam Volume: 60 billion emails/day (est.)
- Death: McColo takedown (2008)
Rustock (2006-2011)
- Innovation: Polymorphic code, anti-analysis
- Scale: ~1 million bots
- Spam Volume: 30-40 billion emails/day
- Death: Microsoft/FBI takedown (March 2011)
Cutwail (2007-2014)
- Innovation: Spam-as-a-Service business model
- Scale: ~1.5 million bots
- Spam Volume: 74 billion emails/day at peak
- Notable: Survived multiple takedown attempts
Grum (2008-2012)
- Innovation: Extremely efficient SMTP engine
- Scale: ~120,000 bots
- Spam Volume: 18 billion emails/day (18% of global spam)
- Death: Coordinated takedown (July 2012)
Spam Email Characteristics
Headers from Botnet Spam:
Received: from unknown (HELO mail.randomword.com) (98.234.15.67)
by mx.victim.com with SMTP; Tue, 15 Mar 2008 14:23:15 -0500
From: "Canadian Pharmacy" <deals@pharma-discount.biz>
Reply-To: orders@different-domain.info
Subject: RE: Your prescription is ready
Message-ID: <random123@infected-pc.home>
X-Mailer: Microsoft Outlook Express 6.00
Buy now at lowest prices!!!
Telltale Signs:
- Residential IP addresses (dynamic, DSL/cable ranges)
- Missing or malformed headers
- HELO/EHLO mismatch with actual hostname
- Inconsistent Message-ID formats
- Generic subjects with RE:/FW: prefixes
SMTP Session from Bot
$ telnet mx.victim.com 25
220 mx.victim.com ESMTP ready
HELO definitely-real-mail-server.com β Fake hostname
250 Hello definitely-real-mail-server.com
MAIL FROM:<random34234@sender.com> β Randomized sender
250 OK
RCPT TO:<victim@victim.com>
250 OK
DATA
354 Start mail input
From: Canadian Pharmacy <drugs@pharma.com>
To: victim@victim.com
Subject: RE: Important medication notice
[Spam content with image-based text, random word salad,
URL to pharmacy site, unsubscribe link to track opens]
.
250 OK, message queued
QUIT
Defenses
IP Reputation Systems
Dynamic blacklists that learn sending patterns:
Traditional Blacklist:
IP 1.2.3.4 β Blacklist (static entry)
Reputation System:
IP 1.2.3.4:
- Emails sent today: 10,000
- Spam complaints: 8,000
- Reputation score: 0.1 (terrible)
β Temporarily block, re-evaluate in 24h
Key Services:
- Spamhaus ZEN
- Barracuda Reputation
- Cloudmark Sender Intelligence
- Return Path (now Validity)
ISP Port 25 Blocking
Residential ISPs block outbound port 25:
Home PC ββXβββ port 25 βββ Victim's mail server
β
β BLOCKED
β
βββββ ISP's mail server (port 587) βββ Victim
β
ISP can monitor
and rate-limit
Impact: Bots must either:
- Relay through ISP (gets caught)
- Use compromised servers (limited supply)
- Find open proxies (cat-and-mouse)
Botnet Takedowns
Coordinated disruption of C2 infrastructure:
McColo Takedown (2008):
Before: McColo hosting provider hosts C2 for Srizbi, Rustock, others
Action: Upstream providers cut off McColo
After: Global spam drops 75% overnight
Rustock Takedown (2011):
Before: ~1 million bots sending 40B emails/day
Action: Microsoft legal action + FBI raids
After: C2 servers seized, bots orphaned
Content-Based Filtering
Machine learning on email content:
# Simplified spam classifier
features = [
contains_pharmacy_keywords(email),
has_image_heavy_content(email),
url_reputation_score(email.links),
sender_reputation(email.from),
bayesian_spam_probability(email.body)
]
if ml_model.predict(features) > 0.8:
mark_as_spam(email)
Advantage: Works regardless of sending IP.
Attacker Adaptation
Fast-Flux DNS
Rapidly rotate IP addresses behind domains:
Minute 1: spam-site.com β 1.2.3.4
Minute 2: spam-site.com β 5.6.7.8
Minute 3: spam-site.com β 9.10.11.12
TTL: 60 seconds
IPs: infected machines serve content
Snowshoe Spam
Spread sending across many IPs at low volume:
Traditional: 1 IP sends 1 million emails β Easy to block
Snowshoe: 1000 IPs each send 1000 emails β Harder to block
Each IP stays under reputation thresholds
Webmail Compromise
Shift from botnets to compromised legitimate accounts:
Instead of: Bot β Victim
Now: Compromised Gmail/Yahoo account β Victim
Benefits:
- Inherits provider's reputation
- No residential IP issues
- Passes SPF/DKIM
Migration to Other Channels
Spam moved beyond email:
- SMS spam (smishing)
- Social media spam
- Messaging app spam
- Comment spam
Current State
Status: Limited
Traditional spam botnets have declined significantly:
| Factor | Impact |
|---|---|
| Port 25 blocking | Bots canβt send directly |
| Takedown operations | Major botnets disrupted |
| ML filtering | Content detection improved |
| Account compromise | Shifted to webmail abuse |
| DMARC adoption | Spoofing harder |
Still Active:
- Emotet (rebuilt 2021, focuses on malware delivery)
- Smaller regional botnets
- IoT-based botnets (Mirai descendants)
Detection Guidance
Network Indicators
Monitor for:
- Outbound SMTP from workstations (unusual)
- High-volume email from single hosts
- Connections to known botnet C2
Email Analysis
Flag spam characteristics:
email.sender_ip IN residential_ip_ranges
AND email.spf_result != "pass"
AND email.content_spam_score > 0.7
AND email.links.domain_age < 30_days
Botnet Infection Indicators
On endpoints:
- Unusual SMTP traffic
- DNS queries to fast-flux domains
- Processes sending email without user action
- Communication with known C2 infrastructure
Historical Significance
Botnet spam infrastructure drove:
- IP reputation systems
- Behavioral email filtering
- Machine learning in email security
- ISP abuse desk operations
- International law enforcement cooperation
The arms race continues, but the battlefield has shifted from botnets to compromised accounts and other channels.
What Killed It (or Weakened It)
| Defense | Introduced | Impact |
|---|---|---|
| IP Reputation Systems | 2004 | Dynamic blacklists track sending behavior across IPs |
| Botnet Takedowns | 2008 | Law enforcement and researchers disrupt C2 infrastructure |
| ISP Port 25 Blocking | 2010 | Residential IPs can't send direct SMTP; must use ISP relays |
| Machine Learning Spam Filters | 2012 | Content-based detection catches spam regardless of source IP |