Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:00 AM
Connect Directly

SecureWorks Unveils Research on Spamming Botnets

Research firm contends that newly revealed 'Kraken' bot army is actually an older botnet

SAN FRANCISCO -- RSA 2008 Conference -- The world’s largest spamming botnets can send over 100 billion spam messages a day, according to a newly released report by SecureWorks.

In an interview here, Joe Stewart, director of malware research for SecureWorks, also disputed that the massive "Kraken" botnet revealed by Damballa earlier this week is new. Kraken is actually the existing Bobax botnet, which SecureWorks ranks number two among spamming botnets, he said. (See New Massive Botnet Twice the Size of Storm.)

Damballa on Monday released details on Kraken, which it says is an all-new botnet that's twice the size of Storm, with 400,000 bots, including machines in 50 of the Fortune 500 companies.

But Stewart, who headed up SecureWorks's study, says Kraken and Bobax share common strings and functionality at the core, so they are the same botnet. "A lot of the code has changed over time; features have been added and removed. But at the core, it is the same code project, maintained by the same author [or authors] this entire time," he says.

Damballa, meanwhile, maintains that Kraken is indeed a distinct botnet and not Bobax. Bill Guerry, vice president of product management for Damballa, said today that his company has previously performed analysis on Bobax, and that the two botnets have distinct command-and-control characteristics. Damballa plans to release more technical details on Kraken later today to help confirm this assertion, he says.

SecureWorks's Stewart said yesterday that part of the discrepancy in identifying the botnets may have to do with the fact that virus writers don't label their code with one static name. "So we, as researchers, are left with naming things based on what we can see. There's no central source of information on what malware contains what strings, and we can only rely on what we've seen ourselves, or the scraps the AV companies give us," he says.

Another issue may be that SecureWorks and Damballa each took a slightly different look at botnet size in their research: SecureWorks's study focused specifically on botnets that send spam and their malware, while Damballa looked at the overall number of bots and the command-and-control makeup of Kraken, regardless of the type of payload it was sending.

"From what I can tell, Damballa is counting bots that are resolving the command-and-control network name and trying to connect on TCP port 447. We are counting only the part of the botnet that can send spam," Stewart notes. "Neither count can ever be a true count of the botnet size, because just like many firewalls/ISPs will block direct-to-MX outbound connections from their users, many corporate firewalls will block TCP port 447 outbound, as no known-good protocols traverse that port."

Damballa's Guerry says Kraken uses a different command-and-control than Bobax, running over an encrypted and custom TCP and UDP connection over Port 447. And there are often similarities among malware that botnets use. "When you look at malware, there are always similarities," he says (see video). .

SecureWorks's list of the top spamming botnets, in order of size is: Srizbi, with 315,000 bots; Bobax, with 185,000 bots; Rustock, with 150,000 bots; Cutwail, with 125,000 bots; Storm, with 85,000 bots (only 35,000 of which send email); Grum, with 50,000 bots; OneWordSub, with 40,000 bots; Ozdok, with 35,000 bots; Nucrypt, with 20,000 bots; Wopla, with 20,000 bots; and Spamthru, with 12,000 bots.

Srizbi, which uses encrypted command and control to send a variety of spam, can send up to 60 billion spam messages a day, according to SecureWorks, and is also known as Cbeplay and Exchanger. It's infamous for its advertising links to porn-related video files of celebrities, which are really malware that aims to infect PCs and recruit them as bots.

Bobax -- aka Bobic, Oderoor, Cotmonger, and Hacktool.Spammer -- can send about 9 billion spams per day, and is also encrypted. It used to send mostly mortgage spam, according to SecureWorks, but is doing more low-interest loan spam.

Interestingly, Storm -- aka Nuwar, Peacomm, and Zhelatin -- came in fifth place in size, spamming at a rate of 3 billion a day, according to the SecureWorks report. Its capacity is limited by the fact that only machines behind NAT firewalls send spam, while the other bots are used as fast-flux HTTP and DNS hosts for the spamming system.

Stewart noted that the spamming botnets are all starting to routinely use rootkits to keep bots infected as long as possible. Srizbi, for instance, uses rootkits. "Srizbi is big and nasty and hard to [detect]," he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • SecureWorks Inc.
  • Damballa Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Data Leak Week: Billions of Sensitive Files Exposed Online
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
    Intel Issues Fix for 'Plundervolt' SGX Flaw
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    The Year in Security: 2019
    This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-12-14
    There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
    PUBLISHED: 2019-12-14
    Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
    PUBLISHED: 2019-12-13
    There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
    PUBLISHED: 2019-12-13
    Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
    PUBLISHED: 2019-12-13
    Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...