Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/14/2010
05:59 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New Wave Of DDoS Botnets Emerge

'DDoS-as-a-business' is thriving, experts say

A brazen new DDoS-as-a-service offering out of China operates in the open on the Web, adding 10,000 new infected machines as bots per day. Another DDoS botnet has been attacking Web servers worldwide for months at a major clothing retailer, as well as various banks, social networking sites, insurance, and government agencies. And political hacktivism remains alive and well as sites known to be critical of the Malaysian government currently are under a series of DDoS attacks.

Distributed denial-of-service, or DDoS, attacks -- where armies of bots are pointed at a website or servers and instructed to send streams of innocuous traffic in order to overwhelm and ultimately shut down an organization's online presence or resources -- are nothing new. But the bad guys are finding new ways to capitalize on this classic attack that's nearly impossible to prevent and cost businesses in downtime and lost revenue.

Damballa Research's discovery this week of the so-called IMDDOS, a commercial service for DDoS attacks, is now one of the largest active global botnets, according to researchers there. The botnet is made up mostly of infected machines in China, but U.S. machines are in the top 10 countries with infected IMDDOS machines, many of which are from North American ISPs and major corporations.

DDoS-as-a-service is nothing new -- botnet operators traditionally have offered different services via underground forums. "As a potential renter, you would communicate directly with the owner and negotiate through IRC [Internet Relay Chat]," says Gunter Ollmann, vice president of research at Damballa.

But the IMDDOS service operates in plain sight with a website that details the various levels of service it offers. "This is a full-service offering ... they can handle multiple subscribers simultaneously," he says. "This is the next step up on the ladder in sophistication."

Ollmann says the botnet swelled in activity to about 25,000 unique recursive DNS lookups per hour. Damballa doesn't have hard numbers on the bot count, but Ollmann says the botnet is targeting named Web servers. "The malware itself is unsophisticated, but technically it's a multipurpose agent," he says.

Researchers at Arbor Networks are investigating whether IMDDOS is related to another Chinese DDoS botnet they have been watching, YoyoDdos, which has attacked nearly 200 websites, mostly in China, as well as some U.S. sites. "We think that there may be some lineage there with YoyoDdos and other China-based botnet tools, possibly due to shared code," says Jose Nazario, senior security researcher for Arbor.

"'DDoS as a business' is thriving and continues to evolve," says Andre' Di Mino, director of Shadowserver, who has been tracking the BlackEnergy-based botnet DDoS'ing various industries worldwide. "We've seen advances in botnet technology that specializes in DDoS attacks, and there is no shortage of groups that are willing to carry out attacks for a price."

And demand for these services is on the rise, he says. "It's not just extortion anymore. It's also in reducing your competitor's availability, retaliation, or to simply make a statement against a cause or organization," Di Mino says. "DDoS is again evolving into not just a technical consideration -- there are social, political, and economic issues involved as well."

Arbor's Nazario says DDoS has remained a hot attack method during the past few years. The biggest changes in DDoS have been DDoS attackers aiming for the application layer rather than the network layer, at HTTP and DNS. "We think it's a means to cause more load for the effort, dealing with Windows' disabling of raw sockets, and the propagation of code bases that everyone seems to use or copy," says Nazario, who blogged about the Malaysian DDoS attacks this week.

Damballa's Ollmann says DDoS botnets tend to be made up of hand-me-down or recycled bots. "Compromised machines constantly are changing hands. They seem to cycle through different botnet operators specializing in different types of tasks," Ollmann says. "The value of the machine is diminished when it's handed over several times, so you tend to see the bottom rung on hand-me-downs is DDoS."

It's a way for botnet operators to squeeze maximum value out of the bots, he says.

And all the while, the commercial black market for DDoS is growing and becoming more visible, he says, such as the IMDDOS service. Ollmann has published a report that analyzes IMDDOS and its malware, which he says is a unique family of malicious code.

Damballa has been working with authorities to shut down the U.S.- and other government-accessible elements of the botnet, which uses free dynamic DNS provider services out of China, he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19037
PUBLISHED: 2019-11-21
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
CVE-2019-19036
PUBLISHED: 2019-11-21
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
CVE-2019-19039
PUBLISHED: 2019-11-21
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program.
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.