Feeds

Microsoft teams up with Feds, Europol in ZeroAccess botnet zombie hunt

Just don't bork our crim-busting honeypots again

Using blade systems to cut costs and sharpen efficiencies

Microsoft has teamed up with the FBI to launch a renewed attempt to disrupt the operations of the infamous ZeroAccess botnet.

ZeroAccess is responsible for infecting over two million computers, specifically targeting search results as part of a click-fraud scam that Redmond estimates is costing online advertisers $2.7m a month. The botnet, which first appeared on the scene around three years ago, has also been used at times to hijack compromised devices for Bitcoin mining.

The malware is one of the most robust and durable botnets in operation, built to deliberately to be resilient to disruption efforts by relying on a peer-to-peer infrastructure that allows cybercriminals to remotely control the botnet from tens of thousands of different computers. An offensive led by Symantec in October is credited with taking out a quarter of the compromised drones in the botnet army.

Microsoft launched a further attack this week in collaboration with Europol’s European Cybercrime Centre (EC3), the Federal Bureau of Investigation and tech firms including A10 Networks.

"Microsoft expects that this action will significantly disrupt the botnet’s operation, and is already working with ecosystem partners around the world to notify people if their computer is infected and will be making this information available through its Cyber Threat Intelligence Program (C-TIP)," Microsoft said in a statement.

Redmond hasn't provided an estimates of how many machines it has taken away from the control of the unknown cybercrooks behind the ZeroAccess menace but it's honest enough to admit it almost certainly hasn't landed a killer blow.

"Because of the sophistication of the threat, Microsoft and its partners do not expect to fully eliminate the ZeroAccess botnet. However, we do expect this legal and technical action will significantly disrupt the botnet’s operation by disrupting the cybercriminals’ business model and forcing them to rebuild their criminal infrastructure, as well as preventing victims’ computers from committing the fraudulent schemes," it said

This is Microsoft's eighth botnet takedown operation in the past three years. The attack against ZeroAccess is Microsoft’s first anti-botnet effort since it unveiled its new Cybercrime Center last month.

Reaction to Microsoft's zombie killing efforts from the security world has been largely positive but there have been criticisms from some security researchers that Redmond's takedown operations have caused collateral damage to honeypot networks. In particular, the sinkholing* of domains associated with the Citadel botnet back in June provoked protests about disruption and criticism that it hadn't actually killed the zombie network. Redmond previously hijacked domains associated with the ZeuS banking Trojan, causing similar problems by trampling over researchers' honeypots in the process.

A blog post by Richard Domingues Boscovich, assistant general counsel at Microsoft's Digital Crimes Unit, complete with an associated video, which explains the ZeroAccess botnet takedown, can be found here. ®

Sinknote

* Sinkholing is “a technique that researchers use to redirect the identification of [a botnet]'s malicious C&C server to their own analysis server” according to Trend Micro (PDF, readable, 6 pages)

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.