Massive Necurs Spam Botnet Now Equipped to Launch DDoS AttacksWith more than one million active bots at any time, a Necurs-enabled DDoS attack could dwarf such an attack by the Mirai botnet.
In an ominous development, the world’s largest spam botnet has acquired capabilities that could allow it to be used in massive distributed denial-of-service attacks.
Security researchers at BitSight’s Anubis Labs recently observed the Necurs botnet loading a component in infected systems that allow the systems to perform DDoS attacks.
The addition of the new component appears to have started at least six months ago, which is when BitSight researchers first observed some unusual communications on a Necurs-infected system.
In addition to communicating via port 80, the Necurs-infected system was also using a different port as well as what appeared to be a different protocol, to communicate with a set of command and control addresses.
A subsequent analysis showed the communications from the infected system to be requests to download two separate modules. One of them was for the usual spam distribution purposes. And the other was for a proxy module that would cause the bot to make HTTP or UDP requests to a target system "in an endless loop," BitSight said in a recent alert.
The bot is modular in design; the proxy and DDOS features are part of a module first was deployed in September, says Tiago Pereira, threat intelligence researcher at Bitsight's Anubis Labs. "The SOCKS/DDOS module is being loaded in all the bots in the botnet," he says. At the same time, the spam modules are also still being loaded on all infected system, he says.
Pereira says BitSight's sinkholes measured an average of over 1 million active Necurs infected system every single day. "Simply taking into account its size—more than double the size of Mirai—we would expect it to produce a very powerful DDoS attack," he says.
Security researchers estimate the overall size of the Necurs botnet to be upwards of 5 million infected systems, though only about 1 million are active at any give time. In addition to being used for spam distribution, the botnet has also been used to deliver the notorious Locky ransomware and the Dridex banking Trojan.
The botnet went offline somewhat inexplicably for a few weeks last year, resulting in an almost immediate drop-off in Locky and Dridex distributions. But it came back online equally inexplicably and with renewed vigor in June, and since then had been used to distribute spam and malware.
With the addition of the new DDoS module, Necurs appears set to become even more versatile than it is already.
Ben Herzberg, security group research manager at Imperva, says it's interesting that Necurs has now added a feature for DDoS attacks. But threat actors are likely to increasingly favor using IoT botnets such as Mirai because they are easier to infect and use than desktop botnets like Necurs, he said.
"Therefore, it seems likely that this is either a test module, or something to be used in a 'doomsday scenario' – for example when the botnet operators need it for a very good reason - not just as a normal DDoS-for-hire campaign," he said in a statement.
Word of the Necurs botnet update comes amid reports of changes to Neutrino, another well-known malware sample that has been used to assemble a large botnet. The authors of the Neutrino bot have developed a new protective loader that makes it harder for malware tools to detect the bot, Malwarebytes Labs said in an alert this week.
The new loader is designed to check whether it is being deployed in a controlled environment like a sandbox or a virtual machine and to delete itself automatically if that is indeed the case, Malwarebytes researchers Hasherezade and Jerome Segura said.
The tweak is not major. But the new protection layer is "very scrupulous in its task of fingerprinting the environment and not allowing the bot to be discovered," they said.
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio