Koobface server pops up in China after HK takedown
Security experts in Hong Kong last week succeeded in taking down a key component of the Koobface botnet, only to witness the system popping up in China.
The Koobface FTP grabber component uploaded stolen FTP user names and passwords to the remote server, which was under the control of cybercrooks. These stolen login credentials gave a pass into corporate networks and valuable data before the server was taken down last week, largely thanks to the efforts of the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT).
In response, the Koobface gang moved their server to a hosting firm in China. Last month the command and control servers associated with Koobface underwent a complete refresh.
Koobface spread via messages on social networking sites like Facebook and Twitter. Cybercrooks behind the sophisticated malware make their money by distributing scareware packages onto compromised machines, and by other cyberscams, including information harvesting. The worm gets less press than the malware associated with the Google China attacks or the high-profile Conficker worm, though experts consider it both more sophisticated and a bigger security threat.
A blog post by Trend Micro with more details on the FTP grabber and the Hong Kong takedown operation can be found here. ®
Sponsored: Network DDoS protection