Feeds

Net provider accused of coddling crooks yanked offline

Spam volumes plummet

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Yet another network provider has been yanked offline after being accused by security researchers of acting as the mothership that allowed a large percentage of the world's spam operators and malicious networks to thrive.

Upstream service to US-based McColo Corporation was terminated sometime Tuesday, according to researchers from Arbor Networks, which monitors internet traffic, and other firms. Hurricane Electric, one of McColo's upstream providers, told Brian Krebs's Security Fix blog it cut off service after it was presented with evidence demonstrating the magnitude of nuisance its customer represented.

Representatives of McColo didn't return a phone call seeking comment.

According to a host of independent security experts, McColo represented a key link in a notorious chain of other network providers that catered to spammers, botnet operators and malware purveyors. Some researchers claimed McColo provided the connectivity that was responsible for more than half the world's spam. McColo's dissolution was immediately followed by a marked decrease in spam and botnet activity, they said.

"In our own database we have been tracking a few dozen botnets that phoned home to McColo IPs as well as nearly 1000 distinct URLs from hundreds of different malcode samples, Arbor's Jose Nazario wrote here. "These guys ran a dirty operation.

Statistics from SpamCop showed a drop in the amount of spam being blasted out to the world. Starting Tuesday afternoon, spam volumes dropped from about 30 junk messages being sent every second to less than 15 at time of writing.

"When McColo went off the net yesterday we saw a very dramatic fall-off of botnet activity on the internet as the 'command and control' servers for many botnets were on McColo," Spamhaus chief executive Steve Linford wrote in an email.

The take-down of McColo comes two months after Intercage, another network provider with a sullied reputation, was disconnected by its last remaining transit providers. The termination created a brief decline in spam and malicious net activity, but most of the bad actors that used Intercage have since found new providers, researchers have said.

McColo's demise came as a new report (PDF) claimed the provider enables a host of bad actors on the internet. In addition to spammers and botnet operators, at least 40 websites, nameservers or payment services used for child pornography were also recently found to be hosted by McColo, according to the report.

Even with the termination by Hurricane Electric, a second provider, Global Crossing, continued to provide connectivity to McColo, according to the CyberCrime and Doing Time blog. So far, Global Crossing's public relations reps have been vague about their plans for McColo, saying only that Global Crossing cooperates with law enforcement, their peers and security researchers to weed out bad actors.

Whatever the case, it would appear that McColo has been almost completely severed from the internet. With the exception of two netblocks (one is a /21 and the other a /22) all others are missing. Domain names with suspicious sounding names including teenincestpics dot com and Canadianpharmacycorp4 dot com - which had once relied on McColo's IP space to connect - were no longer resolving. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.