Agent Skills: Botnet Disruption: Coordinated Takedown Methodology

Coordinated botnet takedown methodologies — sinkholing, infrastructure mapping, legal frameworks, BGP intervention, and post-disruption analysis. Studies Operation Endgame, Badbox 2.0, and emerging blockchain C2 countermeasures. Defensive disruption for authorized law enforcement, CERT, and academic research contexts.

UncategorizedID: plurigrid/asi/botnet-disruption

Install this agent skill to your local

pnpm dlx add-skill https://github.com/plurigrid/asi/tree/HEAD/skills/botnet-disruption

Skill Files

Browse the full folder contents for botnet-disruption.

Download Skill

Loading file tree…

skills/botnet-disruption/SKILL.md

Skill Metadata

Name
botnet-disruption
Description
Coordinated botnet takedown methodologies — sinkholing, infrastructure mapping, legal frameworks, BGP intervention, and post-disruption analysis. Studies Operation Endgame, Badbox 2.0, and emerging blockchain C2 countermeasures. Defensive disruption for authorized law enforcement, CERT, and academic research contexts.

Botnet Disruption: Coordinated Takedown Methodology

Status: Active Trit: +1 (GENERATOR — produces disruption actions, countermeasures, takedown plans) Context: Authorized law enforcement support, CERT coordination, academic research


Disruption Taxonomy

| Method | Speed | Permanence | Legal Complexity | Scope | |--------|-------|-----------|-----------------|-------| | DNS sinkholing | Hours | Temporary (re-register) | Medium (registrar cooperation) | Domain-level | | Server seizure | Days-weeks | Permanent per server | High (court orders, cross-jurisdiction) | Infrastructure | | BGP null-route | Minutes | Temporary | Low (ISP cooperation) | IP prefix | | Coordinated takedown | Months prep | Highly effective | Very high (multi-nation) | Ecosystem | | Demand-side prosecution | Months-years | Deterrent | Very high | Customers | | Smart contract monitoring | Continuous | Ongoing | Novel/untested | On-chain |


DNS Sinkholing

Methodology

1. Identify malicious domains (passive DNS, DGA prediction, threat intel)
2. Obtain authority (registrar cooperation, court order, registry action)
3. Redirect DNS records to defender-controlled sinkhole server
4. Capture bot connections for:
   - Victim enumeration (source IPs → notify affected orgs)
   - C2 protocol analysis (understand command structure)
   - Propagation mapping (which domains bots try next)
5. Maintain sinkhole (bots keep connecting until cleaned)

Scale (2025)

22.3 million domains sinkholed in 2025 (Disclosing.Observer passive DNS study). 13 distinct takedown bursts identified via Kleinberg's burst detection model. Largest single event: Badbox 2.0 (April 10, 2025) — 5M+ subdomains.

Post-Sinkhole Analysis

Historical A-records → hosting org identification
NS delegation patterns → infrastructure reuse detection
Subdomain generation patterns → automation fingerprinting
Shared subdomain labels → pivot across related C2 domains

Coordinated Takedowns

Operation Endgame (Template)

The defining multi-phase disruption of 2024-2026:

| Phase | Date | Targets | Results | |-------|------|---------|---------| | Phase 1 | May 2024 | IcedID, Smokeloader, SystemBC, Pikabot, Bumblebee | 4 arrests, 100+ servers, 2000+ domains | | Phase 2 | April 2025 | Smokeloader customers (demand side) | 5 detentions, persona→identity via seized DB | | Phase 3 | Nov 2025 | Rhadamanthys, VenomRAT, Elysium | 1025+ servers, 20 domains, suspect arrested |

Key innovation: Database seizure → link online personas to real identities → prosecute demand side. Phases separated by months. Each phase builds on intelligence from previous phase.

Badbox 2.0 Takedown (April 2025)

  • 10M Android devices pre-infected at factory
  • Used as residential proxy network
  • 5M+ subdomains sinkholed in single action
  • Infrastructure distributed across Cloudflare, Amazon, Hostinger
  • Detection: reused Cloudflare NS pairs across unrelated domains

The Telnet Silence (Feb 10, 2025)

Global Telnet scanning traffic dropped 60%+ in a single day. Cause debated: possible major undisclosed takedown, ISP intervention, or infrastructure failure. Demonstrates achievable scale of disruption.


BGP-Level Intervention

Defensive BGP

ISP announces null-route for known C2 IP prefixes
→ traffic to C2 IPs drops into blackhole
→ bots cannot reach command infrastructure

Counter-example: Root DNS Hijack (June 2025)

8 root DNS servers simultaneously BGP-hijacked (19:40-21:10 UTC). 3 hijacked prefixes had valid RPKI ROAs — attack succeeded because downstream networks didn't implement Route Origin Validation (ROV).

Lesson: BGP security remains incomplete. RPKI+ROV deployment is necessary but insufficient.


Legal Frameworks

United States

| Statute | Application | |---------|-------------| | 18 U.S.C. §1030(a)(5) (CFAA) | Criminalizes computer damage including botnet creation/operation | | FRCP 41(b)(6)(B) | Search warrants for botnets affecting 5+ judicial districts | | 18 U.S.C. §1345 | Civil injunctions for domain seizure (GameOver Zeus precedent) |

International

| Framework | Scope | Parties | |-----------|-------|---------| | Budapest Convention | First cybercrime treaty | 81 ratifications (Aug 2025) | | Joint Investigation Teams | Cross-border operations | Europol/Eurojust coordination | | MLAT | Mutual Legal Assistance Treaty | Bilateral evidence sharing |

Cross-Jurisdictional Challenges

  • C2 servers in non-cooperative jurisdictions
  • Bot population spans dozens of countries
  • Evidence preservation during multi-month investigation
  • Different legal standards for domain seizure across registries

Blockchain C2 Countermeasures

The Problem

Traditional: seize C2 server → botnet dies
Blockchain: C2 address stored in immutable smart contract
           → can't seize Ethereum
           → can't modify contract state
           → bots always find new C2 via on-chain read

Countermeasures (Emerging)

| Approach | Mechanism | Limitation | |----------|-----------|-----------| | RPC endpoint blocking | Block bot access to public Ethereum RPC nodes | Bots can run own node | | Contract interaction monitoring | Flag addresses querying known malicious contracts | Privacy tools (Tornado) obscure source | | Transaction graph analysis | Trace operator's funding chain | Mixers/bridges break chain | | Validator-level censorship | OFAC-compliant validators refuse to include malicious txs | Decentralization vs. censorship tension | | Honeypot contracts | Deploy decoy contracts mimicking C2 pattern | Requires deep understanding of specific botnet |

Game-Theoretic Frame

Blockchain C2 is a mechanism design problem:

  • Operator pays gas fees → traceable funding chain
  • Defender can front-run C2 updates with counter-updates (if contract allows)
  • Economic cost of maintaining blockchain C2 > traditional C2
  • Attacker/defender game on-chain becomes public and auditable
;; Blockchain C2 defense as open game via Nashator
(define blockchain-c2-game
  (DSL.game "blockchain_c2_defense"
    (list (DSL.player "Operator" +1 3)   ; update/fund/rotate
          (DSL.player "Defender" -1 3))   ; monitor/front-run/trace
    blockchain-c2-payoffs))

Disruption Pipeline (Operational)

Phase 0: Intelligence Gathering

Passive DNS monitoring → DGA prediction → domain enumeration
Network telescope (darknet) → scan traffic analysis
Honeypot/honeynet → C2 protocol capture
MISP → aggregate threat intel from multiple sources

Phase 1: Infrastructure Mapping

C2 domains → historical A-records → hosting providers
NS delegation → registrar identification
Whois/RDAP → registrant (often privacy-protected)
BGP origin → ASN → upstream provider
TLS certificates → certificate transparency logs → related domains

Phase 2: Legal Authorization

Evidence compilation → search warrant application
Cross-jurisdiction coordination (Europol/FBI/NCA)
Domain seizure orders per jurisdiction
Hosting provider preservation orders
ISP traffic monitoring orders

Phase 3: Coordinated Action

Simultaneous execution across all jurisdictions
DNS sinkholing + server seizure + BGP null-route
Operator infrastructure denied at all layers
Sinkhole server captures victim connections

Phase 4: Post-Disruption

Victim notification (via sinkholed connections)
Database analysis (seized operational data)
Persona → identity linking (demand-side prosecution)
Public reporting + IOC sharing via MISP
Monitoring for reconstitution attempts

Integration with Goblins Adapter

Capability-Gated Disruption Tools

;; Disruption tools as Goblins actors
;; Each tool requires explicit capability — no ambient authority

(define (^sinkhole-analyzer bcom dns-query-cap)
  "Analyze sinkhole traffic. Can ONLY query DNS — cannot modify."
  (methods
    [(analyze domain)
     ($ dns-query-cap resolve domain)]))

(define (^infrastructure-mapper bcom whois-cap ct-cap bgp-cap)
  "Map C2 infrastructure. Read-only capabilities only."
  (methods
    [(map-domain domain)
     (let ((whois (<- whois-cap lookup domain))
           (certs (<- ct-cap search domain))
           (bgp (<- bgp-cap origin domain)))
       ;; Promise pipeline: 3 queries, 1 RTT
       (list whois certs bgp))]))

Fast Path (Zig)

DGA domain batch analysis at SIMD speed:

  • Entropy computation: 10K domains in ~100μs
  • Frequency analysis: character n-gram extraction vectorized
  • Connects to fast-bridge.zig dispatch table

GF(3) Triads

botnet-studies (-1) ⊗ blackhat-go (0) ⊗ botnet-disruption (+1) = 0 ✓  [Attack/Coord/Defend]
botnet-studies (-1) ⊗ network-forensics (0) ⊗ botnet-disruption (+1) = 0 ✓  [Analyze/Forensic/Disrupt]
reverse-engineering (-1) ⊗ captp (0) ⊗ botnet-disruption (+1) = 0 ✓  [RE/Transport/Disrupt]
counter-surveillance (-1) ⊗ nashator (0) ⊗ botnet-disruption (+1) = 0 ✓  [Surveil/Equilib/Disrupt]
botnet-studies (-1) ⊗ botnet-disruption (+1) ⊗ nashator (0) = 0 ✓  [Study/Disrupt/Balance]

References

  • Operation Endgame: europol.europa.eu (Phases 1-3, May 2024 → Nov 2025)
  • Disclosing.Observer: 22.3M domains sinkholed (2025 passive DNS study)
  • Badbox 2.0: HUMAN Security takedown report (April 2025)
  • Budapest Convention on Cybercrime: 81 ratifications
  • Tsundere botnet: Ethereum smart contract C2 (OffSeq threat radar)
  • BGP root DNS hijack: Qrator Labs analysis (June 2025)
  • FlipIt + MARL for MTD: ScienceDirect/TechScience (2025)
  • 18 U.S.C. §1030, §1345: Congressional Research Service LSB11165