Risk
4/14/2011
12:38 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI Busts Coreflood Botnet

Authorities get court authority to replace the botnet's command and control servers with their own and remotely disable the botnet on infected PCs.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The Department of Justice and the FBI announced Wednesday that they have obtained a temporary restraining order enabling them to disable the Coreflood botnet and respond to infected PCs. Authorities also obtained search warrants allowing them to seize five command-and-control (C&C) servers--located in Arizona, Georgia, Texas, Ohio, and California--and a seizure warrant for 29 domain names used by the botnet.

A related civil complaint, filed by the government on Monday against 13 "John Doe" defendants, alleged that they have engaged in "wire fraud, bank fraud, and unauthorized interception of electronic communications" by using the botnet, which installed key-logging software to steal people's personal financial information. Criminals used the information to remove money from people's bank accounts via wire transfers.

Authorities said that, as of February 2010, about 2.3 million PCs were infected with Coreflood, and 80% of them were located in the United States. According to court documents, known victims of the botnet have included a Tennessee defense contractor who lost $242,000, a North Carolina investment company that lost $151,000, and a Michigan real estate company that lost $116,000.

Thanks to the temporary restraining order, authorities can swap out the servers powering Coreflood for their own, replacing them with substitute C&C servers run by the government. The court has issued a permanent injunction against the defendants running Coreflood on any computer, and authorizes authorities to install replacement C&C servers wherever they find more Coreflood servers, at least on U.S. soil.

"The seizure of the Coreflood servers and Internet domain names is expected to prevent criminals from using Coreflood or computers infected by Coreflood," said David B. Fein, U.S. attorney for the District of Connecticut, in a statement.

Computers infected by Coreflood regularly attempt to phone home to the C&C server. When they do so, the government's substitute C&C servers will return a command to disable the malware. At the same time, authorities will alert the user's Internet service provider that the PC is infected by Coreflood, and ask the service provider to contact the user and recommend that they install antivirus software to eliminate the infection.

Authorities said that anyone will be able to "opt out" of the temporary restraining order, "if for some reason they want to keep Coreflood running on their computers." They also promised that "at no time will law enforcement authorities access any information that may be stored on an infected computer."

Authorities recently worked with Microsoft to take down the Rustock botnet, backed by a court order that enabled them to physically remove C&C servers from hosting premises. But adding substitute C&C servers is a new tactic. According to a statement from Shawn Henry, executive assistant director of the FBI's criminal, cyber, response, and services branch, "these actions to mitigate the threat posed by the Coreflood botnet are the first of their kind in the United States and reflect our commitment to being creative and proactive in making the Internet more secure."

Similar coordinated-takedown tactics have already been used abroad--to good effect--most notably in the Dutch takedown of the Bredolab botnet. Costin Raiu, director of the global research and analysis team at Kaspersky Lab, speaking at a press event in early 2011, said that the Dutch approach was a model for correctly busting a botnet. In particular, the Dutch authorities monitored Bredolab for a long period of time, then launched a coordinated takedown, first arresting the alleged botnet mastermind, then waiting to see who else took over running the botnet.

"The right way here is to go after not just the botnet, but to arrest the herder--the botnet master--so the Dutch found out who was behind the botnet," said Raiu. Next, they contacted both Romanian and Armenian police, because the suspect had dual nationality. Finally, they waited. When the bot-herder made plans to fly to Armenia, Dutch police requested that they detain him when he landed. Then they waited again, to see if anyone else assumed control of Bredolab.

With Coreflood, it's not clear if U.S. authorities have identified actual suspects--per the 13 "John Doe" defendants--or if they're working with more basic information, such as the IP addresses of computers located abroad. The Department of Justice couldn't be reached for immediate comment.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.