Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/13/2020
12:00 PM
Tanner Johnson
Tanner Johnson
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Trickbot Botnet Response Highlights Partnerships Preventing US Election Interference

Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.

The United States Cyber Command (USCYBERCOM) recently conducted a coordinated operation aimed at disrupting the largest international botnet, operating under the Trickbot moniker. 

With an estimated million or more hijacked computers infected with the botnet's malware, Trickbot is reportedly being commanded and controlled by a Russian criminal organization, which appears intent on deploying ransomware attacks and disrupting the 2020 US presidential election. Coordination and collaboration between defense agencies and technology firms is expected to continue in the fight against malicious threat actors the world over.

USCYBERCOM and Microsoft Target Trickbot

Krebs on Security was one of the first organizations to report that an unknown entity was responsible for repeatedly disrupting Trickbot's network operations over the last few weeks.  The entity managed to send a command to all zombie systems infected with the Trickbot malware to disconnect themselves from the criminal organization's command and control servers. 

In addition to this disruption, the entity had managed to flood the Trickbot database with millions of false records designed to ultimately confound the botnet’s operators. As it turns out, several sources told the Washington Post that the previously "unknown entity" disrupting the botnet was actually a coordinated joint operation between USCYBERCOM, a branch of the Defense Department lead by the director of the National Security Agency (NSA), and Microsoft.

While this operation resulted in the successful separation of a large number of victims' systems from the Trickbot network, the success has been short lived. Despite losing access to a significant portion of their zombie systems, the botnet overlords are still in possession of a great deal of stolen sensitive victim information extracted from those disconnected zombie systems. 

Additionally, the Trickbot operators were quick to begin rebuilding their database, and had managed to return to relatively normal ransomware operations within a few days. While they were witnessed expressing annoyance over the setback through backchannel discussions, the overlords appeared emboldened by the disruption. Further discussions were overserved where they considered simply increasing the amount demanded with each ransom as a means of recouping their losses.

USCYBERCOM Shows Success Protecting Elections

Botnets such as Trickbot represent a significant challenge due to their ever-evolving nature, though such threats are nothing new for CYBERCOM, still a relatively young combatant command within the U.S. military. 

One of the command's primary duties is to protect elections from foreign cyber threats. For example, USCYBERCOM served a pivotal role during the 2018 midterm elections by disrupting the internet access of Russian troll farms like the Internet Research Agency (IRA), which seeks to spread disinformation through various social media platforms. 

USCYBERCOM worked with the NSA to establish the Russia Small Group task force, designed to ensure the democratic electoral process took place without interference. This task force began engaging in offensive "hunt forward" missions, designed to assist allied nations in detecting malware on their networks, while also allowing the US to learn from such incidents and improve its defenses.

Election interference challenges still remain an international concern, and botnets like Trickbot remain a primary threat to the 2020 US election. USCYBERCOM will continue to expand these offensive operations in coordination with partnerships from allied nations and technology firms. 

Microsoft, for its part, has already warned officials that Chinese, Iranian, and Russian hacker groups are already targeting the Trump and Biden campaign organizations. However, the comprehensive impact on the election process itself is likely to be limited to hindering access to voting, rather than outright preventing it. Justice Department officials have recognized that disrupting legitimate access to election infrastructure through a distributed denial-of-service (DDoS) attack is far easier for hackers to execute than actually altering votes.

Related Content:

Tanner Johnson is a cybersecurity analyst focused on IoT and transformative technologies at Omdia. His coverage is focused on examining the various threats that occupy the IoT technology domain, as well as opportunities and strategies that are emerging as data connectivity ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20538
PUBLISHED: 2021-05-10
IBM Cloud Pak for Security (CP4S) 1.5.0.0 and 1.5.0.1 could allow a user to obtain sensitive information or perform actions they should not have access to due to incorrect authorization mechanisms. IBM X-Force ID: 198919.
CVE-2021-20559
PUBLISHED: 2021-05-10
IBM Control Desk 7.6.1.2 and 7.6.1.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199228.
CVE-2021-20577
PUBLISHED: 2021-05-10
IBM Cloud Pak for Security (CP4S) 1.5.0.0 and 1.5.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force I...
CVE-2021-29501
PUBLISHED: 2021-05-10
Ticketer is a command based ticket system cog (plugin) for the red discord bot. A vulnerability allowing discord users to expose sensitive information has been found in the Ticketer cog. Please upgrade to version 1.0.1 as soon as possible. As a workaround users may unload the ticketer cog to disable...
CVE-2020-13529
PUBLISHED: 2021-05-10
An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.