Attacks/Breaches
11/28/2013
11:40 PM
Gunter Ollmann
Gunter Ollmann
Commentary
Connect Directly
RSS
E-Mail
50%
50%

A Mercenary Approach To Botnets

When does a botnet become valuable to government intelligence agencies?

For a period of two years, if often felt that not a week went by without some security company or product vendor announcing the takedown of a multimillion-node botnet. I don't know if it was the waning enthusiasm of the media to cover "yet another botnet takedown," the public's exhaustion over a threat they could do little prevent, or the fact that the majority of botnet "takedowns" were merely temporary setbacks for their criminal overlords, but as we reach the end of 2013, the frequency of such boastings have declined noticeably.

While the public broadcasts of botnet takedowns are now more likely to be associated with a golden age in the battle against the bots, the war continues on a less visible plane. Regardless of whether this war can, in fact, be won, a question I'm increasingly being asked is whether certain organizations and government entities actually want to win it.

Why wouldn't the good guys want to win the botnet battle? Many salty dogs of the security industry have experienced how shutting down one attack vector forces the threat to evolve in another direction -- a direction that will likely be even more difficult to combat or, minimally, require substantial research effort to investigate. Eighty percent efficacy against a threat you understand is considerably better than 0 percent of a threat you have no technology in your back pocket for.

But that’s not the only reason why a growing pool of security professionals would sooner hold back from shutting down the botnets that plague the Internet. Botnets harvest a lot of data from their victims. Access to that data is increasingly lucrative and, if you package the data just right, can be sold on as a subscription feed to a growing pool of organizations.

The security analyst community used to be quite open in the way they shared information about botnets -- in particular, information about the command-and-control (C&C) servers, the domain names and IP addresses being used, samples of the bot malware, and copies of the C&C software. Now, because this information has a demonstrable value, those that have it are much less likely to "give back to the community." If anything, they're more likely to create new subscription services and provide it as a paid-for stream of data.

But what is this data, and who is it useful to?

When people first hear that botnet data is up for sale, I think most jump to the conclusion that the data is a stream of all of the personal and confidential information being stolen from the botnet victims. In some cases it may be, but most often it's not. More often than not, it may simply be a list of IP addresses of the victims under the control of a single piece of malware.

Depending on who you're selling to and what their missions are, even data as "uninteresting" as the IP addresses of the victims holds a unique and complementary value to some folks. For example, government agencies such as the CIA or NSA can use it to map which botnets are successfully penetrating computers within countries or institutions they're tracking. By knowing what the original malware was, the agency is going to know the operating system and major application version numbers of the infected devices. This adds to the pool of knowledge about an adversary, which could be leveraged in a time of need.

If an organization is smart, it'll also be sinkholing the C&C domains -- probably not all of them, just enough to provide visibility of the victims, but not crossing a threshold that forces the criminal who built the botnet to change tactics and stop growing the botnet.

If the botnet C&C software isn't particularly well-written (which is often the case), or if someone has reverse-engineered the C&C portal software and found interesting vulnerabilities, then simply knowing the domain names used by the botnet malware could allow an agency to access all the information being harvested by the bot on the victims computer (e.g., UIDs, passwords, applications installed, browser history, banking credentials, etc.), or even issue new commands.

It used to be that the worlds of bug hunters and malware analysts were separate and far between. In the past couple of years, the ability to analyze malware samples and identify exploitable vulnerabilities in them has become very important. Given that some botnets have a bigger pool of victims than many commercial software vendors have licensed customers, the value of an exploit that grants reliable remote control of a popular malware agent is rising in value. I'd hazard a guess that a remotely exploitable vulnerability in Zeus, SpyEye, or any of the other top10 botnet malware families is likely worth tens of thousands of dollars to most government agencies around the world.

In many ways, botnets have become a golden goose to those charged with gathering intelligence on the populations of foreign entities. The bulk of the victim's data is useful for mapping populations, communication profiles, and as egress points for counterintelligence exercises. Then, given how many botnet victims there are, the probability that a few "interesting" computers will have succumbed along the way is similarly high -- providing direct insight in to a pool of high value targets.

The incentives are high for many businesses and government agencies to not be too heavy-handed in combating the global botnet pandemic. There's money to be had and, with each passing day, more interesting ways are being uncovered in how to package the data, and how to employ it.

-- Gunter Ollmann, CTO, IOActive Inc.

Gunter Ollmann serves as CTO for IOActive Inc. where he is responsible for the strategic vision of the security services portfolio, driving new research areas and bringing new services to market. With over two decades in the information security arena, Gunter has stared down ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.