Feeds

Pushdo botnet's smokescreen traffic hits legitimate websites

Aargh, cap'n, the server be like to founder

Build a business case: developing custom apps

Cybercrooks behind the resilient Pushdo botnet are bombarding legitimate small websites with bogus traffic in order to camouflage requests to the zombie network's command and control servers.

A varying cast of around 300 genuine (mostly smaller) websites is at the receiving end of queries from zombie drones infected with the latest variant of Pushdo, according to Brett Stone-Gross, a senior security researcher at Dell SecureWorks' Counter Threat Unit (CTU).

"In some cases these fake web server requests are overwhelming small web sites," Stone-Gross explained.

Previous variants of the malware that appeared around two years ago spewed bogus requests buried in SSL traffic to large websites (CIA, PayPal etc) - for reasons that have never been adequately explained. The latest behaviour is arguably even more noxious because it might easily be to blame for exhausting the bandwidth limits of small websites.

"The purpose of these fake HTTP requests is to make Pushdo's command and control (C2) traffic, which also uses HTTP, blend in with legitimate traffic," a blog post by Dell SecureWorks on the latest Pushdo botnet trickery explains.

The Pushdo botnet first appeared around 2007 and has been associated with the spam-pushing Cutwail botnet throughout that time. Stone-Gross reckons both Pushdo and Cutwail are the work of the same well-resourced eastern European gang. Pushdo creates a backdoor onto infected machines through which bot-herders can push Cutwail. The same approach has also been used to distribute variants of the infamous ZeuS banking Trojan and other similar nasties.

Despite four takedowns over five years Pushdo continues to flourish.

"The group behind the botnet is well funded and every takedown is only temporary," Stone-Gross said. The botmasters behind Pushdo have recently begun sending spam to eastern Europe and Russia: but not the phishing emails or malware that users in the west are bombarded with.

The latest variant of Pushdo is using a combination of spam and drive-by downloads to spread. The population of infected drones has varied from 112,000 to 200,000 bots in recent months, according to monitoring stats from Dell SecureWorks. ®

Bot-note

Fake HTTP GET/POST requests generated by the latest variant of Pushdo variant can be spotted by the anomalous requests that follow the format "http : //<domain>/?xclzve_[30 random characters]". Website owners affected by Pushdo may filter the requests using a web server rule dropping traffic that matches this pattern.

The essential guide to IT transformation

More from The Register

next story
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Know what Ferguson city needs right now? It's not Anonymous doxing random people
U-turn on vow to identify killer cop after fingering wrong bloke
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.