Skip to main content

LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit

  • Conference paper
  • First Online:
Computer Security – ESORICS 2020 (ESORICS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12309))

Included in the following conference series:

Abstract

While various covert botnets were proposed in the past, they still lack complete anonymization for their servers/botmasters or suffer from slow communication between the botmaster and the bots. In this paper, we propose a new generation hybrid botnet that covertly and efficiently communicates over Bitcoin Lightning Network (LN), called LNBot. LN is a payment channel network operating on top of Bitcoin network for faster Bitcoin transactions with negligible fees. Exploiting various anonymity features of LN, we designed a scalable two-layer botnet which completely anonymize the identity of the botmaster. In the first layer, the botmaster sends commands anonymously to the C&C servers through LN transactions. Specifically, LNBot allows botmaster’s commands to be sent in the form of surreptitious multihop LN payments, where the commands are encoded with ASCII or Huffman encoding to provide covert communications. In the second layer, C&C servers further relay those commands to the bots they control in their mini-botnets to launch any type of attacks to victim machines. We implemented a proof-of-concept on the actual LN and extensively analyzed the delay and cost performance of LNBot. Our analysis show that LNBot achieves better scalibility compared to the other similar blockchain botnets with negligible costs. Finally, we also provide and discuss a list of potential countermeasures to detect LNBot activities and minimize its impacts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Indonesia)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (Indonesia)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 49.99
Price excludes VAT (Indonesia)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    A satoshi is defined to be 0.00000001 Bitcoin. In other words, 1 Bitcoin is 100 million satoshi.

  2. 2.

    https://github.com/LightningNetworkBot/LNBot.

  3. 3.

    Check LNB6’s channel (1735152493945290752) opening transaction for instance: fc46c99233389d24c4fd9517cd503f08265c517a6f0570d806e7cc98b7f7963b.

  4. 4.

    In a similar way, check one of our mainnet node’s channel opening transaction: 1d81b6022ff1472939c4db730ca01b82d43b616e757d799aea17ee0db6427520.

References

  1. 1ml.com: Lightning network search and analysis engine (2019). https://1ml.com/

  2. Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: ZombieCoin: powering next-generation botnets with bitcoin. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 34–48. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48051-9_3

    Chapter  Google Scholar 

  3. Ali, S.T., McCorry, P., Lee, P.H.J., Hao, F.: Zombiecoin 2.0: managing next-generation botnets using bitcoin. Int. J. Inf. Secur. 17(4), 411–422 (2018)

    Google Scholar 

  4. Baden, M., Torres, C.F., Pontiveros, B.B.F., State, R.: Whispering botnet command and control instructions. In: 2019 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 77–81. IEEE (2019)

    Google Scholar 

  5. Bailey, M., Cooke, E., Jahanian, F., Xu, Y., Karir, M.: A survey of botnet technology and defenses. In: Cybersecurity Applications & Technology Conference For Homeland Security, CATCH 2009, pp. 299–304. IEEE (2009)

    Google Scholar 

  6. Béres, F., Seres, I.A., Benczúr, A.A.: A cryptoeconomic traffic analysis of bitcoins lightning network. arXiv preprint arXiv:1911.09432 (2019)

  7. Calhoun Jr, T.E., Cao, X., Li, Y., Beyah, R.: An 802.11 MAC layer covert channel. Wirel. Commun. Mob. Comput. 12(5), 393–405 (2012)

    Google Scholar 

  8. Casenove, M., Miraglia, A.: Botnet over tor: the illusion of hiding. In: 2014 6th International Conference On Cyber Conflict (CyCon 2014), pp. 273–282. IEEE (2014)

    Google Scholar 

  9. Danezis, G., Goldberg, I.: Sphinx: a compact and provably secure mix format. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 269–282. IEEE (2009)

    Google Scholar 

  10. Franzoni, F., Abellan, I., Daza, V.: Leveraging bitcoin testnet for bidirectional botnet command and control systems. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 3–19. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_1

    Chapter  Google Scholar 

  11. Frkat, D., Annessi, R., Zseby, T.: Chainchannels: private botnet communication over public blockchains. In: IEEE ITHINGS-GREENCOM-CPSCOM-SMARTDATA 2018, pp. 1244–1252. IEEE (2018)

    Google Scholar 

  12. Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-peer botnets: overview and case study. In: HotBots 2007, p. 1 (2007)

    Google Scholar 

  13. Huffman, D.A.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098–1101 (1952)

    Article  Google Scholar 

  14. Learning Labs: Bolt #4: onion routing protocol (2019). https://github.com/lightningnetwork/lightning-rfc/blob/master/04-onion-routing.md

  15. Learning Labs: Lightning network daemon (2019). https://lightning.engineering

  16. Learning Labs: LND gRPC API reference (2019). https://api.lightning.community/

  17. Learning Labs: Sample lnd.conf (2019). https://github.com/lightningnetwork/lnd/blob/master/sample-lnd.conf

  18. Malaika, M.: Botract (2017). https://sector.ca/wp-content/uploads/presentations17/Majid-Malaika-Botract_SecTor.pdf

  19. Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P., Borisov, N.: Stegobot: a covert social network botnet. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 299–313. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_21

    Chapter  Google Scholar 

  20. Natarajan, V., Sheen, S., Anitha, R.: Multilevel analysis to detect covert social botnet in multimedia social networks. Comput. J. 58(4), 679–687 (2015)

    Article  Google Scholar 

  21. Ollmann, G.: Botnet communication topologies (2009). Accessed 30 Sept 2009

    Google Scholar 

  22. Osuntokun, O.: New draft sphinx send mode for spontaneous payments (2019). https://github.com/lightningnetwork/lnd/pull/2455

  23. Pantic, N., Husain, M.I.: Covert botnet command and control using Twitter. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 171–180. ACM (2015)

    Google Scholar 

  24. Pass, R., et al.: Micropayments for decentralized currencies. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 207–218. ACM (2015)

    Google Scholar 

  25. Pirozzi, A., Paganini, P.: Experts presented botchain, the first fully functional botnet built upon the bitcoin protocol (2018). https://securityaffairs.co/wordpress/77395/malware/botchain-botnet-bitcoin-protocol.html

  26. Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2015). https://lightning.network/lightning-network-paper.pdf

  27. Roffel, D., Garrett, C.: A novel approach for computer worm control using decentralized data structures (2014)

    Google Scholar 

  28. Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)

    Article  Google Scholar 

  29. Sweeny, J.: Botnet resiliency via private blockchains (2017). https://www.sans.org/reading-room/whitepapers/covert/botnet-resiliency-private-blockchains-38050

  30. Tsiatsikas, Z., Anagnostopoulos, M., Kambourakis, G., Lambrou, S., Geneiatakis, D.: Hidden in plain sight. SDP-based covert channel for botnet communication. In: Fischer-Hübner, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 48–59. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22906-5_4

    Chapter  Google Scholar 

  31. Wang, P., Wu, L., Aslam, B., Zou, C.C.: A systematic study on peer-to-peer botnets. In: 2009 Proceedings of 18th International Conference on Computer Communications and Networks, pp. 1–8. IEEE (2009)

    Google Scholar 

  32. Zohar, O.: Unblockable chains (2018). https://github.com/platdrag/UnblockableChains

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmet Kurt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kurt, A., Erdin, E., Cebe, M., Akkaya, K., Uluagac, A.S. (2020). LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds) Computer Security – ESORICS 2020. ESORICS 2020. Lecture Notes in Computer Science(), vol 12309. Springer, Cham. https://doi.org/10.1007/978-3-030-59013-0_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59013-0_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59012-3

  • Online ISBN: 978-3-030-59013-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics