Feeds

Zombie-animating malnets increase 200% in just 6 months

Cybercrooks beef up botnet-powering badness

Using blade systems to cut costs and sharpen efficiencies

Crybercrooks are beefing up the infrastructure behind the delivery of botnets, a move that is leading towards more potent and numerous threats, say researchers.

Botnet infections are commonly spread though compromised websites seeded with malicious scripts and promoted via black hat SEO tactics such as link farms. These malware networks, or malnets, pose a growing threat, according to a new study by web security firm Blue Coat.

Malnets largely deal in mass market malware and as such are different from advanced persistent threats (APTs) associated with cyber-espionage attacks targeting large corporations and Western governments. Attacks will be updated and changed, but the underlying infrastructure used to lure in users and deliver these attacks is reused. The ease with which cyber criminals can launch attacks using malnets creates a vicious cycle, a process by which individuals are lured to malware, infected, and then used to infect others.

First the malnet drives a user to the malware. Then the user’s computer is infected with a Trojan. Once the computer is compromised it can be used by the botnet to lure new users into the malnet by using the infected machine to send spam to email contact lists, for example. A compromised system can also be used to steal the victim’s personal information or money, and, in some cases, can also function as a jumping-off point for attacks on neighboring machines.

"Their [malnet] infrastructure is comprised of several thousand unique domains, servers and websites that work together to funnel users to a malware payload," Tim Van Der Horst, a senior malware researcher at Blue Coat, explained. "This infrastructure of relay and exploit servers allows malnet operators to quickly launch new attacks that can be tailored to attract large groups of potential victims."

Blue Coat expect malnets to account for more than two-thirds of all malicious cyber attacks in 2012. The firm is currently tracking more than 1,500 unique malnets, a 200 per cent (four-fold) increase from just six months ago.

The biggest malnet, dubbed Shnakule by Blue Coat, not only communicates frequently but also changes hostnames frequently, as the web filtering firm explains.

Shnakule is a wide ranging malnet that engages in a variety of malfeasant activities, including fake AV, codec, Flash and browser updates, pornography, gambling and work-at-home scams. To scale the nfrastructure to accommodate attacks associated with these activities, Shnakule operators bring new domains and servers online. Over the course of six months Shnakule used anywhere from 50 to 5,005 unique domain names per day.

Other malnets are more focused on specific malicious activities. Rubol, for example, is a spam ecosystem that operates in bursts. When it is actively launching attacks, the malnet will use as many as 476 unique domain names but this can drop to a single domain during inactive periods.

Search Engine Poisoning (SEP) continues to be the leading entry point into malnets, driving users to malware more than 35 per cent of the time. However, cyber criminals have moved away from targeting breaking news or big events. For example, of more than 28,000 successful search engine poisoning attacks in the weeks around the Olympics, only 0.18 per cent were related to the Olympics.

Email and pornography drive roughly 11 and 4 per cent, respectively, of malnet attacks. The biggest change in the last eight months had been the decline of social networking – from 6.5 per cent of all attacks to just over 1 per cent. "The full reasoning for this drop is not fully known, but part of it is attributable to greater awareness of social networking users and more robust policing of malicious content on the part of the social networks themselves," Blue Coat explains.

Looking at malware delivery infrastructures rather than infected zombies, Blue Coat has reached the conclusion that the infamous ZeuS banking Trojan toolkit is on decline.

Over the last six months a new botnet, Aleuron, has risen to take its place. Activity from the Aleuron botnet increased 517 percent, surpassing Zeus and making it the most active botnet in the wild, according to Blue Coat.

The ease with which this infrastructure can be shifted to avoid detection or target a new group of users, makes it especially tricky to eradicate malnets. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.