Vulnerabilities / Threats
10/29/2010
10:37 AM
50%
50%

Bredolab Botnet Still Spewing Malware

Days after Dutch authorities disabled 143 command and control servers, security researchers are seeing new signs of life.

Slideshow: Cloud Security Pros And Cons
Slideshow: Cloud Security Pros And Cons
(click image for larger view and for full slideshow)

Is the Bredolab botnet really dead?

On Monday, Dutch authorities announced that, working in conjunction with hosting provider LeaseWeb, they'd seized -- and crucially, disconnected from the Internet -- 143 command and control (C&C) servers hosting Bredolab in the Netherlands.

Meanwhile on Tuesday, authorities in Armenia arrested a man suspected of being the botnet's mastermind. Since then, according to news reports, Dutch authorities have promised that, as they as they unravel the financial dealings underpinning the botnet, they expect to make further arrests.

But has Bredolab truly been busted? "The glib answer is that we don't know, but let's consider the current situation," said Rik Ferguson, solutions architect for Trend Micro. "Many if not most of the victim machines infected by Bredolab remain infected, [so] the botnet has simply been decapitated."

That decapitation produced a significant decline in botnet-related traffic. Even so, he said, "there is at least one Bredolab C&C server still active and... it is not hosted in the Netherlands, where there is one, there is the potential for more."

Unfortunately, according to Jo Hurcombe and Manoj Venugopalan, malware analysts for Symantec Hosted Services, they began seeing that "Bredolab runs distributing different payloads" the morning after Dutch authorities announced the takedown. By that afternoon, they reported seeing 750 Bredolab-spawned spam emails, more than half of which targeted Spanish users with subject lines riffing on DHL or UPS invoices, as many Bredolab-related attacks do.

According to the Symantec researchers, the emails use fake icons, such as a bogus Microsoft Excel icon, to try and trick the recipient into clicking on the icon. Once executed, the malicious file drops further, hidden files into the system and temp directories, one of which is a downloader that connects to a Bredolab C&C server. Many Bredolab infections also install fake antivirus -- aka scareware -- programs to attempt to get users to pay for bogus software.

Bredolab appears to have taken a big hit. But whether or not it was a death blow remains to be seen. "It is clear from past experience with botnets such as Mega-D and Cutwail that criminal software displays remarkable tenacity and a disturbing ability to rise phoenix-like from the ashes of a concerted take-down attempt," said Trend Micro's Rik Ferguson. "Let's hope that is not the case with Bredolab."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6123
Published: 2014-12-28
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.

CVE-2014-6160
Published: 2014-12-28
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.