Risk
4/14/2011
12:38 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI Busts Coreflood Botnet

Authorities get court authority to replace the botnet's command and control servers with their own and remotely disable the botnet on infected PCs.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The Department of Justice and the FBI announced Wednesday that they have obtained a temporary restraining order enabling them to disable the Coreflood botnet and respond to infected PCs. Authorities also obtained search warrants allowing them to seize five command-and-control (C&C) servers--located in Arizona, Georgia, Texas, Ohio, and California--and a seizure warrant for 29 domain names used by the botnet.

A related civil complaint, filed by the government on Monday against 13 "John Doe" defendants, alleged that they have engaged in "wire fraud, bank fraud, and unauthorized interception of electronic communications" by using the botnet, which installed key-logging software to steal people's personal financial information. Criminals used the information to remove money from people's bank accounts via wire transfers.

Authorities said that, as of February 2010, about 2.3 million PCs were infected with Coreflood, and 80% of them were located in the United States. According to court documents, known victims of the botnet have included a Tennessee defense contractor who lost $242,000, a North Carolina investment company that lost $151,000, and a Michigan real estate company that lost $116,000.

Thanks to the temporary restraining order, authorities can swap out the servers powering Coreflood for their own, replacing them with substitute C&C servers run by the government. The court has issued a permanent injunction against the defendants running Coreflood on any computer, and authorizes authorities to install replacement C&C servers wherever they find more Coreflood servers, at least on U.S. soil.

"The seizure of the Coreflood servers and Internet domain names is expected to prevent criminals from using Coreflood or computers infected by Coreflood," said David B. Fein, U.S. attorney for the District of Connecticut, in a statement.

Computers infected by Coreflood regularly attempt to phone home to the C&C server. When they do so, the government's substitute C&C servers will return a command to disable the malware. At the same time, authorities will alert the user's Internet service provider that the PC is infected by Coreflood, and ask the service provider to contact the user and recommend that they install antivirus software to eliminate the infection.

Authorities said that anyone will be able to "opt out" of the temporary restraining order, "if for some reason they want to keep Coreflood running on their computers." They also promised that "at no time will law enforcement authorities access any information that may be stored on an infected computer."

Authorities recently worked with Microsoft to take down the Rustock botnet, backed by a court order that enabled them to physically remove C&C servers from hosting premises. But adding substitute C&C servers is a new tactic. According to a statement from Shawn Henry, executive assistant director of the FBI's criminal, cyber, response, and services branch, "these actions to mitigate the threat posed by the Coreflood botnet are the first of their kind in the United States and reflect our commitment to being creative and proactive in making the Internet more secure."

Similar coordinated-takedown tactics have already been used abroad--to good effect--most notably in the Dutch takedown of the Bredolab botnet. Costin Raiu, director of the global research and analysis team at Kaspersky Lab, speaking at a press event in early 2011, said that the Dutch approach was a model for correctly busting a botnet. In particular, the Dutch authorities monitored Bredolab for a long period of time, then launched a coordinated takedown, first arresting the alleged botnet mastermind, then waiting to see who else took over running the botnet.

"The right way here is to go after not just the botnet, but to arrest the herder--the botnet master--so the Dutch found out who was behind the botnet," said Raiu. Next, they contacted both Romanian and Armenian police, because the suspect had dual nationality. Finally, they waited. When the bot-herder made plans to fly to Armenia, Dutch police requested that they detain him when he landed. Then they waited again, to see if anyone else assumed control of Bredolab.

With Coreflood, it's not clear if U.S. authorities have identified actual suspects--per the 13 "John Doe" defendants--or if they're working with more basic information, such as the IP addresses of computers located abroad. The Department of Justice couldn't be reached for immediate comment.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0485
Published: 2014-09-02
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.

CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5136
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in Innovative Interfaces Sierra Library Services Platform 1.2_3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.