Attacks/Breaches
11/10/2011
11:30 AM
50%
50%

FBI Busts $14 Million Botnet Fraud Gang

Estonia-based gang's malware altered computers' DNS settings, rerouted them to sites that generated referral revenue for the attackers.

The FBI announced Wednesday that--working closely with law enforcement agencies in Estonia and the Netherlands--it had executed the takedown of the DNS Changer botnet, which it said was used to fraudulently generate at least $14 million through click fraud and other fraudulent techniques.

The bureau's investigation, dubbed "Operation Ghost Click," included Tuesday raids on data centers in Chicago and New York to disable a botnet command-and-control infrastructure involving 100 servers, communicating with as many as four million infected PCs worldwide. The botnet began operating in 2007, if not sooner, and by October 2011 had infected at least 500,000 computers in the United States, including systems belonging to U.S. government agencies, including NASA.

A federal indictment unsealed Wednesday accused six Estonian men--Vladimir Tsastsin, 31, Timur Gerassimenko, 31, Dmitri Jegorov, 33, Valeri Aleksejev, 31, Konstantin Poltev, 28, and Anton Ivanov, 26--of participating in the scheme. All were arrested on Tuesday in Tartu, the second largest city in Estonia, by Estonian police. Meanwhile, a seventh gang member named in the indictment, Russian national Andrey Taame, 31, remains at large. (Estonia, unlike the United States, does have an extradition treaty with Russia, although it's not necessarily respected.)

[Learn Why Patches Don't Stop Most Attacks.]

According to the indictment, the gang signed legitimate contracts with Internet advertising firms that earned them money every time someone clicked on a link for certain advertisements, or viewed an advertisement on a website. But the indictment accused the gang of using malware to generate those clicks or impressions, as well as to block antivirus product updates. Likewise, attempting to browse to antivirus websites, such as Avast or AVG, or to the Microsoft Windows update site, would return fake server connection or page display errors.

The gang is accused of laundering its ill-gotten advertising fees through a variety of shell companies, including Rove Digital in Estonia, as well as others in Britain, Denmark, Estonia, as well as the United States. "Rove Digital is a seemingly legitimate IT company based in Tartu with an office where people work every morning. In reality, the Tartu office is steering millions of compromised hosts all over the world and making millions in ill-gained profits from the bots every year," said Feike Hacquebord, a senior threat researcher at Trend Micro, in a blog post.

Trend Micro said it was one of multiple companies that worked with investigators to help bust the botnet, as well as its operators. Trend Micro said it had traced numerous Trojan applications, as well as botnet communications, to Rove Digital, as well as affiliate sites such as Esthost, beginning in 2006.

The gang's malware used click hijacking (aka clickjacking) to reroute people who clicked on legitimate search engine results to a site that paid the attackers for the referral. For example, said authorities, someone searching for "iTunes" on Google would typically see the actual Apple iTunes domain as their first result. But if they clicked that link using a computer infected with the malware, they might instead be rerouted to the www.idownload-store-music.com website, for which the defendants received click-referral income.

Similar schemes were used for other frequent searches. Clicking on a search result involving the IRS, for example, went instead to the website for tax preparers H&R Block, while clicking on a search result for Netflix instead redirected to a shopping-comparison website.

Investigators have also accused the gang of advertising replacement fraud, meaning they substituted their own advertisements for legitimate ones, thus earning money every time someone viewed the illegitimate advertisement. Such techniques were used with the Wall Street Journal website, where a real advertisement for the American Express Plum Card was replaced with an advertisement for Fashion Girl LA, as well as on ESPN's website, where an advertisement for Dr. Pepper was replaced by an ad for a timeshare business.

"These defendants gave new meaning to the term, 'false advertising,'" said Manhattan U.S. attorney Preet Bharara, in a statement.

To be clear, the criminals weren't acting on behalf of H&R Block, Fashion Girl LA, or any of the other advertisers, but simply using them to make money. As noted in the indictment, "the defendants' conduct risked reputational harm to businesses that paid to advertise on the Internet--but that had no knowledge or desire for computer users to be directed to their websites or advertisements through the fraudulent means used by the defendants."

The gang was able to redirect browsers as a result of their malware altering computers' DNS settings so that computers received domain name services from an attacker-controlled server. The FBI has released a troubleshooting document to help people identify if their computer has been infected by the DNS Changer botnet by reviewing their PC or Mac's DNS settings.

"The correctness of your Internet browsing experience is entirely dependent on the correctness of the DNS server you use," said Paul Ducklin, head of technology for Sophos in the Asia Pacific region, in a blog post. "A dishonest DNS server can take you to fraudulent substitutes of any sites it likes. And a dishonest DNS server can be hard to spot--most dodgy servers tell the truth most of the time, telling you strategic lies when a money-making opportunity arises."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/15/2012 | 4:14:09 PM
re: FBI Busts $14 Million Botnet Fraud Gang
Good follow-up to this here:
http://www.securityweek.com/da...
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?