Vulnerabilities / Threats
6/9/2011
11:14 AM
Connect Directly
RSS
E-Mail
50%
50%

Russian Masterminds Ran Rustock Botnet, Microsoft Says

Forensic analysis of server hard drives points to Russian controllers and turns up email templates mentioning that old favorite, Viagra.

Strategic Security Survey: Global Threat, LocalPain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
Has your botnet gone missing? Microsoft has taken the unusual step of running advertisements in two Russian newspapers, alerting the owners of the Rustock botnet that they can attempt to reclaim their confiscated property. The move is part of Microsoft's efforts to identify and serve court summonses to the Rustock botnet masterminds.

"Based on evidence gathered in the case, we have reason to believe that the people behind the Rustock botnet either have operated or are operating out of Russia," said Richard Boscovich, a senior attorney in the Microsoft Digital Crimes Unit, in a blog post. "Consequently, we have placed advertisements in two mainstream Russian newspapers, the Delovoy Petersburg in St. Petersburg and Moscow's daily paper, The Moscow News."

In April, the U.S. District Court for the Western District of Washington instructed Microsoft to submit status updates about its efforts to put names to the "John Does" in its initial anti-Rustock lawsuit. That civil lawsuit, unsealed by the court in March, had alleged that John Does were "controlling a computer botnet and thereby injuring Microsoft and its customers."

Accordingly, Boscovich said that the advertisements "honor our legal obligation to make a good faith effort to contact the owners of the IP address and domain names that were shut down when Rustock was taken offline." The ads also designate a time and place where the botnet owners can argue their side of the case, as well as a related website, if they would rather argue their case remotely.

"Although history suggests that the people associated with the IP addresses and domain names connected with the Rustock botnet are unlikely to come forward in response to a court summons, we hope the defendants in this case will present themselves," he said.

What evidence does Microsoft have that the botnets were being run by people in Russia? According to court documents, Microsoft analyzed 20 seized hard drives from servers that ran Rustock, and found that they'd been used to access numerous websites based in Russia, including the Web-based email service mail.ru, as well as the free software downloading portal freesoft.ru. Another one of the drives had also been used to launch "cyber-attacks into Russian IP (Internet Protocol) space," according to the documents.

Microsoft said that it also had identified a specific WebMoney account that was used to pay for some command-and-control servers. According to the court documents, "WebMoney's records indicate that the owner of the WebMoney account is identified as a Vladimir Alexandrovich Shergin, associated with an address in Khimki, a city near Moscow." To date, however, Microsoft doesn't know whether this name is authentic, fake, or stolen.

The court documents also provide an interesting glimpse into how criminals create and manage botnets. For example, 18 of the seized hard drives used The Onion Router (better known as TOR) to give attackers anonymous access to the servers, as well as to give the servers anonymous access to the Internet. Microsoft also found "custom written software relating to assembly of spam emails and text files"--with one text file alone containing 427,000 harvested email addresses--as well as email templates relating to numerous pharmaceuticals, including Valium, Viagra, and Vicodin.

Microsoft is continuing to pursue botnet leads. For example, it's identified email addresses associated with the botnet masterminds, and is currently awaiting responses to subpoenas it's served to domain registrars and email hosting providers, which may help positively identify the owners of those email addresses.

Microsoft said it's also continuing to investigate "Cosma2k," which was the username associated with someone who signed up for multiple command-and-control servers. According to Microsoft, "this nickname has been associated with the several names: Dmitri A. Sergeev, Artem Sergeev, and Sergey Vladomirovich Sergeev."

Microsoft's use of a civil lawsuit to shut down a botnet was a novel legal strategy that earned it both praise and condemnation from various security, privacy, and legal experts, chiefly because Microsoft didn't just sue the botnet's unknown operators, but physically confiscated their equipment.

But Microsoft was also taking advantage of a rare opportunity. All of the physical servers that served as the Rustock command-and-control system were located--somewhat brazenly, on the part of the masterminds--at U.S. hosting sites. Accordingly, Microsoft gained a court order that enabled it, in conjunction with the U.S. Marshals Service, to physically seize those servers, knocking Rustock offline.

Industry watchers say that Microsoft's Rustock-busting strategy appears to have worked. A recent report from McAfee confirmed that the volume of Rustock traffic has decreased significantly.

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2021
Published: 2014-10-24
Cross-site scripting (XSS) vulnerability in admincp/apilog.php in vBulletin 4.4.2 and earlier, and 5.0.x through 5.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted XMLRPC API request, as demonstrated using the client name.

CVE-2014-3604
Published: 2014-10-24
Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2014-6230
Published: 2014-10-24
WP-Ban plugin before 1.6.4 for WordPress, when running in certain configurations, allows remote attackers to bypass the IP blacklist via a crafted X-Forwarded-For header.

CVE-2014-6251
Published: 2014-10-24
Stack-based buffer overflow in CPUMiner before 2.4.1 allows remote attackers to have an unspecified impact by sending a mining.subscribe response with a large nonce2 length, then triggering the overflow with a mining.notify request.

CVE-2014-7180
Published: 2014-10-24
Electric Cloud ElectricCommander before 4.2.6 and 5.x before 5.0.3 uses world-writable permissions for (1) eccert.pl and (2) ecconfigure.pl, which allows local users to execute arbitrary Perl code by modifying these files.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.