Feeds

Microsoft teams up with Feds, Europol in ZeroAccess botnet zombie hunt

Just don't bork our crim-busting honeypots again

5 things you didn’t know about cloud backup

Microsoft has teamed up with the FBI to launch a renewed attempt to disrupt the operations of the infamous ZeroAccess botnet.

ZeroAccess is responsible for infecting over two million computers, specifically targeting search results as part of a click-fraud scam that Redmond estimates is costing online advertisers $2.7m a month. The botnet, which first appeared on the scene around three years ago, has also been used at times to hijack compromised devices for Bitcoin mining.

The malware is one of the most robust and durable botnets in operation, built to deliberately to be resilient to disruption efforts by relying on a peer-to-peer infrastructure that allows cybercriminals to remotely control the botnet from tens of thousands of different computers. An offensive led by Symantec in October is credited with taking out a quarter of the compromised drones in the botnet army.

Microsoft launched a further attack this week in collaboration with Europol’s European Cybercrime Centre (EC3), the Federal Bureau of Investigation and tech firms including A10 Networks.

"Microsoft expects that this action will significantly disrupt the botnet’s operation, and is already working with ecosystem partners around the world to notify people if their computer is infected and will be making this information available through its Cyber Threat Intelligence Program (C-TIP)," Microsoft said in a statement.

Redmond hasn't provided an estimates of how many machines it has taken away from the control of the unknown cybercrooks behind the ZeroAccess menace but it's honest enough to admit it almost certainly hasn't landed a killer blow.

"Because of the sophistication of the threat, Microsoft and its partners do not expect to fully eliminate the ZeroAccess botnet. However, we do expect this legal and technical action will significantly disrupt the botnet’s operation by disrupting the cybercriminals’ business model and forcing them to rebuild their criminal infrastructure, as well as preventing victims’ computers from committing the fraudulent schemes," it said

This is Microsoft's eighth botnet takedown operation in the past three years. The attack against ZeroAccess is Microsoft’s first anti-botnet effort since it unveiled its new Cybercrime Center last month.

Reaction to Microsoft's zombie killing efforts from the security world has been largely positive but there have been criticisms from some security researchers that Redmond's takedown operations have caused collateral damage to honeypot networks. In particular, the sinkholing* of domains associated with the Citadel botnet back in June provoked protests about disruption and criticism that it hadn't actually killed the zombie network. Redmond previously hijacked domains associated with the ZeuS banking Trojan, causing similar problems by trampling over researchers' honeypots in the process.

A blog post by Richard Domingues Boscovich, assistant general counsel at Microsoft's Digital Crimes Unit, complete with an associated video, which explains the ZeroAccess botnet takedown, can be found here. ®

Sinknote

* Sinkholing is “a technique that researchers use to redirect the identification of [a botnet]'s malicious C&C server to their own analysis server” according to Trend Micro (PDF, readable, 6 pages)

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.