Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/14/2010
05:59 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New Wave Of DDoS Botnets Emerge

'DDoS-as-a-business' is thriving, experts say

A brazen new DDoS-as-a-service offering out of China operates in the open on the Web, adding 10,000 new infected machines as bots per day. Another DDoS botnet has been attacking Web servers worldwide for months at a major clothing retailer, as well as various banks, social networking sites, insurance, and government agencies. And political hacktivism remains alive and well as sites known to be critical of the Malaysian government currently are under a series of DDoS attacks.

Distributed denial-of-service, or DDoS, attacks -- where armies of bots are pointed at a website or servers and instructed to send streams of innocuous traffic in order to overwhelm and ultimately shut down an organization's online presence or resources -- are nothing new. But the bad guys are finding new ways to capitalize on this classic attack that's nearly impossible to prevent and cost businesses in downtime and lost revenue.

Damballa Research's discovery this week of the so-called IMDDOS, a commercial service for DDoS attacks, is now one of the largest active global botnets, according to researchers there. The botnet is made up mostly of infected machines in China, but U.S. machines are in the top 10 countries with infected IMDDOS machines, many of which are from North American ISPs and major corporations.

DDoS-as-a-service is nothing new -- botnet operators traditionally have offered different services via underground forums. "As a potential renter, you would communicate directly with the owner and negotiate through IRC [Internet Relay Chat]," says Gunter Ollmann, vice president of research at Damballa.

But the IMDDOS service operates in plain sight with a website that details the various levels of service it offers. "This is a full-service offering ... they can handle multiple subscribers simultaneously," he says. "This is the next step up on the ladder in sophistication."

Ollmann says the botnet swelled in activity to about 25,000 unique recursive DNS lookups per hour. Damballa doesn't have hard numbers on the bot count, but Ollmann says the botnet is targeting named Web servers. "The malware itself is unsophisticated, but technically it's a multipurpose agent," he says.

Researchers at Arbor Networks are investigating whether IMDDOS is related to another Chinese DDoS botnet they have been watching, YoyoDdos, which has attacked nearly 200 websites, mostly in China, as well as some U.S. sites. "We think that there may be some lineage there with YoyoDdos and other China-based botnet tools, possibly due to shared code," says Jose Nazario, senior security researcher for Arbor.

"'DDoS as a business' is thriving and continues to evolve," says Andre' Di Mino, director of Shadowserver, who has been tracking the BlackEnergy-based botnet DDoS'ing various industries worldwide. "We've seen advances in botnet technology that specializes in DDoS attacks, and there is no shortage of groups that are willing to carry out attacks for a price."

And demand for these services is on the rise, he says. "It's not just extortion anymore. It's also in reducing your competitor's availability, retaliation, or to simply make a statement against a cause or organization," Di Mino says. "DDoS is again evolving into not just a technical consideration -- there are social, political, and economic issues involved as well."

Arbor's Nazario says DDoS has remained a hot attack method during the past few years. The biggest changes in DDoS have been DDoS attackers aiming for the application layer rather than the network layer, at HTTP and DNS. "We think it's a means to cause more load for the effort, dealing with Windows' disabling of raw sockets, and the propagation of code bases that everyone seems to use or copy," says Nazario, who blogged about the Malaysian DDoS attacks this week.

Damballa's Ollmann says DDoS botnets tend to be made up of hand-me-down or recycled bots. "Compromised machines constantly are changing hands. They seem to cycle through different botnet operators specializing in different types of tasks," Ollmann says. "The value of the machine is diminished when it's handed over several times, so you tend to see the bottom rung on hand-me-downs is DDoS."

It's a way for botnet operators to squeeze maximum value out of the bots, he says.

And all the while, the commercial black market for DDoS is growing and becoming more visible, he says, such as the IMDDOS service. Ollmann has published a report that analyzes IMDDOS and its malware, which he says is a unique family of malicious code.

Damballa has been working with authorities to shut down the U.S.- and other government-accessible elements of the botnet, which uses free dynamic DNS provider services out of China, he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Artist Uses Malware in Installation
Dark Reading Staff 5/17/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
CVE-2019-12172
PUBLISHED: 2019-05-17
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
CVE-2019-12168
PUBLISHED: 2019-05-17
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
CVE-2019-12170
PUBLISHED: 2019-05-17
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PH...