Risk
4/14/2011
12:38 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

FBI Busts Coreflood Botnet

Authorities get court authority to replace the botnet's command and control servers with their own and remotely disable the botnet on infected PCs.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The Department of Justice and the FBI announced Wednesday that they have obtained a temporary restraining order enabling them to disable the Coreflood botnet and respond to infected PCs. Authorities also obtained search warrants allowing them to seize five command-and-control (C&C) servers--located in Arizona, Georgia, Texas, Ohio, and California--and a seizure warrant for 29 domain names used by the botnet.

A related civil complaint, filed by the government on Monday against 13 "John Doe" defendants, alleged that they have engaged in "wire fraud, bank fraud, and unauthorized interception of electronic communications" by using the botnet, which installed key-logging software to steal people's personal financial information. Criminals used the information to remove money from people's bank accounts via wire transfers.

Authorities said that, as of February 2010, about 2.3 million PCs were infected with Coreflood, and 80% of them were located in the United States. According to court documents, known victims of the botnet have included a Tennessee defense contractor who lost $242,000, a North Carolina investment company that lost $151,000, and a Michigan real estate company that lost $116,000.

Thanks to the temporary restraining order, authorities can swap out the servers powering Coreflood for their own, replacing them with substitute C&C servers run by the government. The court has issued a permanent injunction against the defendants running Coreflood on any computer, and authorizes authorities to install replacement C&C servers wherever they find more Coreflood servers, at least on U.S. soil.

"The seizure of the Coreflood servers and Internet domain names is expected to prevent criminals from using Coreflood or computers infected by Coreflood," said David B. Fein, U.S. attorney for the District of Connecticut, in a statement.

Computers infected by Coreflood regularly attempt to phone home to the C&C server. When they do so, the government's substitute C&C servers will return a command to disable the malware. At the same time, authorities will alert the user's Internet service provider that the PC is infected by Coreflood, and ask the service provider to contact the user and recommend that they install antivirus software to eliminate the infection.

Authorities said that anyone will be able to "opt out" of the temporary restraining order, "if for some reason they want to keep Coreflood running on their computers." They also promised that "at no time will law enforcement authorities access any information that may be stored on an infected computer."

Authorities recently worked with Microsoft to take down the Rustock botnet, backed by a court order that enabled them to physically remove C&C servers from hosting premises. But adding substitute C&C servers is a new tactic. According to a statement from Shawn Henry, executive assistant director of the FBI's criminal, cyber, response, and services branch, "these actions to mitigate the threat posed by the Coreflood botnet are the first of their kind in the United States and reflect our commitment to being creative and proactive in making the Internet more secure."

Similar coordinated-takedown tactics have already been used abroad--to good effect--most notably in the Dutch takedown of the Bredolab botnet. Costin Raiu, director of the global research and analysis team at Kaspersky Lab, speaking at a press event in early 2011, said that the Dutch approach was a model for correctly busting a botnet. In particular, the Dutch authorities monitored Bredolab for a long period of time, then launched a coordinated takedown, first arresting the alleged botnet mastermind, then waiting to see who else took over running the botnet.

"The right way here is to go after not just the botnet, but to arrest the herder--the botnet master--so the Dutch found out who was behind the botnet," said Raiu. Next, they contacted both Romanian and Armenian police, because the suspect had dual nationality. Finally, they waited. When the bot-herder made plans to fly to Armenia, Dutch police requested that they detain him when he landed. Then they waited again, to see if anyone else assumed control of Bredolab.

With Coreflood, it's not clear if U.S. authorities have identified actual suspects--per the 13 "John Doe" defendants--or if they're working with more basic information, such as the IP addresses of computers located abroad. The Department of Justice couldn't be reached for immediate comment.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web