Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/8/2016
03:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Fast Flux Taken To The Next Level With Zbot Botnet

Zbot's success rests largely on its makers' ability to take advantage of fast-flux network infrastructure.

As attackers seek to maximize their profits and minimize downtime, fast flux networks have grown into a pivotal technique for bad guys seeking to evade detection. And according to a new report out today from RiskAnalytics, there's perhaps no better example of the evolution of fast fluxing techniques than the architecture that's arisen through the highly successful Zbot botnet.

"Much like businesses, it's all about uptime and making money. For the criminals, this is the evolution of that," says Wayne Crowder, director of threat intelligence for RiskAnalytics, referring to rise of Zbot in the underground economy based on its effective fast-flux techniques.

"It's harder to take down, it's harder to track and to control, and they're all about using this to provide uptime and resources for the criminal services sold, ensuring a higher-tier service in the criminal underground," he says.

Fast fluxing is a means of upping the frustration of security team's whack-a-mole hunt for malicious traffic by hiding the infrastructure that hosts malware, phishing, and other nasty sites on a constantly-changing rotation of compromised hosts acting as proxies. The technique has been around for years, but Zbot has taken it to the next level in the advancement of techniques and the scope at which it runs.

"Participating domains return a set of 10 IP addresses for each query with a varying DNS cache time-to-live (TTL) of less than 150 seconds, forcing the addresses to be refreshed after no more than two and a half minutes," explained Crowder and his report co-author Noah Dunker, director of security labs for RiskAnalytics. "Over time, hundreds or thousands of IP addresses are used. This technique is designed to bypass IP address blocking solutions while still maintaining the advantages of a highly-available network." 

One of the techniques that makes Zbot so notable is its use of double fast-fluxing, Dunker says.

"I think what really caught my attention here was that not only did we have fast flux, but we had double flux, which is where the authoritative DNS for the botnet is hosted inside the botnet itself and it is also a moving target," he says.

Additionally, Zbot stands out in its makers' business acumen and their ability to leverage these techniques to build out its level of services, making it a nexus of crimeware campaigns. 

"We weren’t dealing with a single hostname or a tiny group of hostnames or the same kind of behavior on this fast flux botnet," says Dunker. "We were running into a very diverse list of products running on this."

The laundry list included banking Trojans, carder sites, ransomware, spam sent from within the network, click fraud, and more. Overall, Dunker says the takeaway for security professionals is that this is yet another sign of how the criminals continue to hone their trade craft.

"One of the big takeaways is that the criminals are not relying on the old guard of bulletproof hosting providers overseas," he says. "They’re building their own networks from scratch with these botnet tools."

What this means for infosec practices is that not only are the networks resilient, but it is lowering the effectiveness of a lot of endpoint antivirus solutions.

"We highlighted some really low detection rates [in the report] in fact some [Zbot] samples were completely undetected on the first day that we saw the samples. And these are things that pull down multiple different types of malware and then install them on the infected computer," he says.

Related Content:

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8813
PUBLISHED: 2020-02-22
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-9039
PUBLISHED: 2020-02-22
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. T...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue ...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the ...