Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/29/2012
05:23 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

It's (Already) Baaack: Kelihos Botnet Rebounds With New Variant

Botnet hunters debate whether Kelihos/Hlux operators can reclaim rescued bots

Gunter Ollmann, vice president of research at Damballa, says botnet takedowns are a temporary disruption to the operation -- and when it comes to peer-to-peer networks like Kelihos, there's a legal conundrum.

"Like I've said before, if you're going to take down a botnet you have to take out the criminals at the top. It's the only way. Taking out the infrastructure they depend upon for distributing new infectious material and C&C is a disruption technique -- a delaying tactic if you will, and maybe an evidence building process if you're lucky," Ollmann said in a blog post today. "In the case of P2P-based botnets, there's very little infrastructure you can get your hands on -- and you'll probably end up having to issue commands to botnet victim devices -- which is fraught with legal and ethical problems."

[ Microsoft continued its aggressive legal tear against botnets with a new operation for which the software giant successfully seized some command-and-control (C&C) servers run by cybercriminals using Zeus and its related crimeware. See Microsoft, Financial Partners Seize Servers Used In Zeus Botnets. ]

And even if security vendors are able to successfully knock out a C&C infrastructure, it's meaningless unless they also remove the infection vector, according to Ollmann. "Even if you're lucky enough to be able to take out the C&C infrastructure or mechanism of communication, if you don't take out the infection vector -- the mechanisms of distributing new crimeware variants -- you've achieved very little. As evidenced by the most recent Kelihos botnet takedown attempt, the criminals retained their primary distribution system and are already accumulating thousands of new victims per day with their latest Kelihos-variant campaign," he wrote.

Kaspersky's Preuss, meanwhile, maintains that even a temporary shutdown of a botnet is helpful in the fight against botnets. "It would be naive to believe they would not continue to create new botnets for malicious use. Our sinkholing operations for Hlux A and B have shown that our countermeasure efforts are successful, even if it's just a temporary way to slow the group down," he says.

But the big prize is the bad guys, he notes. "The only way to permanently shut down botnets is to arrest and prosecute the creators and groups operating them. This is a difficult task because security companies encounter different federal policies, jurisdictions, and legal processes in various countries where botnets are located. This causes the law enforcement investigations and legal process to be a long and arduous process," Preuss says. "The only way to accelerate this process is by having more international law passed that supports closer collaboration between cybersecurity professionals, law enforcement, and legal systems."

Meanwhile, Seculert reports that the majority of the infected Facebook users are from Poland and the U.S. -- a trend that was seen with the machines Kaspersky and CrowdStrike grabbed. Some 54 percent of the Facebook infections are in Poland, and 30 percent in the U.S., according to Seculert.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/30/2012 | 11:14:48 PM
re: It's (Already) Baaack: Kelihos Botnet Rebounds With New Variant
It's a non-stop game of whack-a-mole. I think it should be expected at this point that botnet operators are going to look for ways to build a more resilient network in light of the success these take downs are having.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20803
PUBLISHED: 2020-11-23
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10; v3.4...
CVE-2019-14586
PUBLISHED: 2020-11-23
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
CVE-2019-14587
PUBLISHED: 2020-11-23
Logic issue EDK II may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2020-0569
PUBLISHED: 2020-11-23
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2020-12351
PUBLISHED: 2020-11-23
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.