Attacks/Breaches

Which Botnet Is Worst? Report Offers New Perspective On Spam Growth

Rustock might be biggest, but Grum is worst offender, MessageLabs study says

In the early days of botnets, size was the main measure of the threat. But as the malicious networks become more sophisticated, researchers say, the biggest networks aren't always the worst offenders.

In a new report (PDF) issued yesterday, researchers at Symantec's MessageLabs unit offered a detailed analysis of the size and output of current botnets, including venerable spam carriers, such as Rustock, as well as emerging offenders, such as Grum and Maazben. One of the report's conclusions: Size doesn't always matter.

Rustock, for example, is still the largest of the botnets, with an estimated size of between 1.3 million and 1.9 million nodes. Cutwail is next in size, with an estimated 1 million to 1.5 million bots.

But neither of these two botnets is the largest proliferator of spam, according to Paul Wood, senior analyst at MessageLabs and one of the authors of the report. That title goes to a rapidly emerging botnet called Grum, which delivered an average of 39.9 billion spam messages per day last quarter -- more than 23 percent of all the spam on the Internet.

"Despite the fact that it's half the size of Rustock, Grum is generating much more spam," Wood says. "It's getting each bot to do a lot more work."

Bobax, a botnet that has been around for more than two years, is also becoming more efficient, generating more than 27 billion messages per day and 15.2 percent of all Internet spam, the report says. That means each Bobax node generates more than 1,400 spam messages per minute.

Botnet operators have discovered that many ISPs don't immediately recognize the huge output of individual bots because each bot's performance is affected only on the upload, not on the download, Wood says. "Your computer might be a bot, but it might not affect your download performance very much," he observes. "It's only when users try to upload something and experience a performance problem that the ISP gets a complaint."

As they become more sophisticated, botnet operators are finding ways to make their infrastructures more efficient, Wood says. A new botnet, Maazben, accounted for only 0.5 percent of Internet spam 30 days ago, but now is generating 4.5 percent -- about 2.4 billion messages a day -- at its peak. As with Bobax, each Maazben bot is highly productive, pushing out nearly 1,300 spam messages per minute.

The operators of Rustock also are becoming more calculated in their approach, Wood says, but in a different way. For years, the botnet generated huge spikes of spam "every fortnight or so," and then would go quiet for long periods, he says. Now Rustock is becoming more regular in its activity, outputting large batches of spam from 3 a.m. to 7 a.m. (U.S. Eastern time) each day, and then going silent after 7 p.m.

"We don't know why it's operating on this schedule, but there's clearly some automation going on there," Wood says. "Is there some sort of maintenance period? Is it doing something else during that time? It's hard to tell. But clearly, with its size Rustock is capable of much greater activity."

No matter what their size or how efficiently they operate, botnets clearly are at the heart of the spam problem, MessageLabs says. According to the report, botnets generated an average of more than 150 billion messages per day last quarter -- nearly 88 percent of all the spam on the Internet.

"The takedown of ISPs like McColo definitely helped, but it doesn't solve the problem," Wood says. "Already we see botnet operators spreading traffic across multiple ISPs, effectively giving themselves better backup than some enterprises have."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20165
PUBLISHED: 2019-03-22
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
CVE-2019-1716
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability ...
CVE-2019-1763
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exist...
CVE-2019-1764
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the ...
CVE-2019-1765
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permis...