Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:00 AM
Connect Directly

SecureWorks Unveils Research on Spamming Botnets

Research firm contends that newly revealed 'Kraken' bot army is actually an older botnet

SAN FRANCISCO -- RSA 2008 Conference -- The world’s largest spamming botnets can send over 100 billion spam messages a day, according to a newly released report by SecureWorks.

In an interview here, Joe Stewart, director of malware research for SecureWorks, also disputed that the massive "Kraken" botnet revealed by Damballa earlier this week is new. Kraken is actually the existing Bobax botnet, which SecureWorks ranks number two among spamming botnets, he said. (See New Massive Botnet Twice the Size of Storm.)

Damballa on Monday released details on Kraken, which it says is an all-new botnet that's twice the size of Storm, with 400,000 bots, including machines in 50 of the Fortune 500 companies.

But Stewart, who headed up SecureWorks's study, says Kraken and Bobax share common strings and functionality at the core, so they are the same botnet. "A lot of the code has changed over time; features have been added and removed. But at the core, it is the same code project, maintained by the same author [or authors] this entire time," he says.

Damballa, meanwhile, maintains that Kraken is indeed a distinct botnet and not Bobax. Bill Guerry, vice president of product management for Damballa, said today that his company has previously performed analysis on Bobax, and that the two botnets have distinct command-and-control characteristics. Damballa plans to release more technical details on Kraken later today to help confirm this assertion, he says.

SecureWorks's Stewart said yesterday that part of the discrepancy in identifying the botnets may have to do with the fact that virus writers don't label their code with one static name. "So we, as researchers, are left with naming things based on what we can see. There's no central source of information on what malware contains what strings, and we can only rely on what we've seen ourselves, or the scraps the AV companies give us," he says.

Another issue may be that SecureWorks and Damballa each took a slightly different look at botnet size in their research: SecureWorks's study focused specifically on botnets that send spam and their malware, while Damballa looked at the overall number of bots and the command-and-control makeup of Kraken, regardless of the type of payload it was sending.

"From what I can tell, Damballa is counting bots that are resolving the command-and-control network name and trying to connect on TCP port 447. We are counting only the part of the botnet that can send spam," Stewart notes. "Neither count can ever be a true count of the botnet size, because just like many firewalls/ISPs will block direct-to-MX outbound connections from their users, many corporate firewalls will block TCP port 447 outbound, as no known-good protocols traverse that port."

Damballa's Guerry says Kraken uses a different command-and-control than Bobax, running over an encrypted and custom TCP and UDP connection over Port 447. And there are often similarities among malware that botnets use. "When you look at malware, there are always similarities," he says (see video). .

SecureWorks's list of the top spamming botnets, in order of size is: Srizbi, with 315,000 bots; Bobax, with 185,000 bots; Rustock, with 150,000 bots; Cutwail, with 125,000 bots; Storm, with 85,000 bots (only 35,000 of which send email); Grum, with 50,000 bots; OneWordSub, with 40,000 bots; Ozdok, with 35,000 bots; Nucrypt, with 20,000 bots; Wopla, with 20,000 bots; and Spamthru, with 12,000 bots.

Srizbi, which uses encrypted command and control to send a variety of spam, can send up to 60 billion spam messages a day, according to SecureWorks, and is also known as Cbeplay and Exchanger. It's infamous for its advertising links to porn-related video files of celebrities, which are really malware that aims to infect PCs and recruit them as bots.

Bobax -- aka Bobic, Oderoor, Cotmonger, and Hacktool.Spammer -- can send about 9 billion spams per day, and is also encrypted. It used to send mostly mortgage spam, according to SecureWorks, but is doing more low-interest loan spam.

Interestingly, Storm -- aka Nuwar, Peacomm, and Zhelatin -- came in fifth place in size, spamming at a rate of 3 billion a day, according to the SecureWorks report. Its capacity is limited by the fact that only machines behind NAT firewalls send spam, while the other bots are used as fast-flux HTTP and DNS hosts for the spamming system.

Stewart noted that the spamming botnets are all starting to routinely use rootkits to keep bots infected as long as possible. Srizbi, for instance, uses rootkits. "Srizbi is big and nasty and hard to [detect]," he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • SecureWorks Inc.
  • Damballa Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio


    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Oldest First  |  Newest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 8/3/2020
    'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
    Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
    Average Cost of a Data Breach: $3.86 Million
    Jai Vijayan, Contributing Writer,  7/29/2020
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-08-05
    Affected versions of Atlassian Fisheye allow remote attackers to view the HTTP password of a repository via an Information Disclosure vulnerability in the logging feature. The affected versions are before version 4.8.3.
    PUBLISHED: 2020-08-04
    In solidus before versions 2.8.6, 2.9.6, and 2.10.2, there is an bility to change order address without triggering address validations. This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipm...
    PUBLISHED: 2020-08-04
    Extreme Analytics in Extreme Management Center before allows unauthenticated reflected XSS via a parameter in a GET request, aka CFD-4887.
    PUBLISHED: 2020-08-04
    save-server (npm package) before version 1.05 is affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version version 1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing Double submit. The CSRF...
    PUBLISHED: 2020-08-04
    An exploitable arbitrary file delete vulnerability exists in SoftPerfect RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can allow an unprivileged user to delete any file on the filesystem. An attacker can send a malicious IRP to trigger this vulnerability.