Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/13/2020
12:00 PM
Tanner Johnson
Tanner Johnson
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Trickbot Botnet Response Highlights Partnerships Preventing US Election Interference

Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.

The United States Cyber Command (USCYBERCOM) recently conducted a coordinated operation aimed at disrupting the largest international botnet, operating under the Trickbot moniker. 

With an estimated million or more hijacked computers infected with the botnet's malware, Trickbot is reportedly being commanded and controlled by a Russian criminal organization, which appears intent on deploying ransomware attacks and disrupting the 2020 US presidential election. Coordination and collaboration between defense agencies and technology firms is expected to continue in the fight against malicious threat actors the world over.

USCYBERCOM and Microsoft Target Trickbot

Krebs on Security was one of the first organizations to report that an unknown entity was responsible for repeatedly disrupting Trickbot's network operations over the last few weeks.  The entity managed to send a command to all zombie systems infected with the Trickbot malware to disconnect themselves from the criminal organization's command and control servers. 

In addition to this disruption, the entity had managed to flood the Trickbot database with millions of false records designed to ultimately confound the botnet’s operators. As it turns out, several sources told the Washington Post that the previously "unknown entity" disrupting the botnet was actually a coordinated joint operation between USCYBERCOM, a branch of the Defense Department lead by the director of the National Security Agency (NSA), and Microsoft.

While this operation resulted in the successful separation of a large number of victims' systems from the Trickbot network, the success has been short lived. Despite losing access to a significant portion of their zombie systems, the botnet overlords are still in possession of a great deal of stolen sensitive victim information extracted from those disconnected zombie systems. 

Additionally, the Trickbot operators were quick to begin rebuilding their database, and had managed to return to relatively normal ransomware operations within a few days. While they were witnessed expressing annoyance over the setback through backchannel discussions, the overlords appeared emboldened by the disruption. Further discussions were overserved where they considered simply increasing the amount demanded with each ransom as a means of recouping their losses.

USCYBERCOM Shows Success Protecting Elections

Botnets such as Trickbot represent a significant challenge due to their ever-evolving nature, though such threats are nothing new for CYBERCOM, still a relatively young combatant command within the U.S. military. 

One of the command's primary duties is to protect elections from foreign cyber threats. For example, USCYBERCOM served a pivotal role during the 2018 midterm elections by disrupting the internet access of Russian troll farms like the Internet Research Agency (IRA), which seeks to spread disinformation through various social media platforms. 

USCYBERCOM worked with the NSA to establish the Russia Small Group task force, designed to ensure the democratic electoral process took place without interference. This task force began engaging in offensive "hunt forward" missions, designed to assist allied nations in detecting malware on their networks, while also allowing the US to learn from such incidents and improve its defenses.

Election interference challenges still remain an international concern, and botnets like Trickbot remain a primary threat to the 2020 US election. USCYBERCOM will continue to expand these offensive operations in coordination with partnerships from allied nations and technology firms. 

Microsoft, for its part, has already warned officials that Chinese, Iranian, and Russian hacker groups are already targeting the Trump and Biden campaign organizations. However, the comprehensive impact on the election process itself is likely to be limited to hindering access to voting, rather than outright preventing it. Justice Department officials have recognized that disrupting legitimate access to election infrastructure through a distributed denial-of-service (DDoS) attack is far easier for hackers to execute than actually altering votes.

Related Content:

Tanner Johnson is a cybersecurity analyst focused on IoT and transformative technologies at Omdia. His coverage is focused on examining the various threats that occupy the IoT technology domain, as well as opportunities and strategies that are emerging as data connectivity ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29040
PUBLISHED: 2021-05-16
The JSON web services in Liferay Portal 7.3.4 and earlier, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 20 and 7.2 before fix pack 10 may provide overly verbose error messages, which allows remote attackers to use the contents of error messages to help launch another, more focused att...
CVE-2021-29041
PUBLISHED: 2021-05-16
Denial-of-service (DoS) vulnerability in the Multi-Factor Authentication module in Liferay DXP 7.3 before fix pack 1 allows remote authenticated attackers to prevent any user from authenticating by (1) enabling Time-based One-time password (TOTP) on behalf of the other user or (2) modifying the othe...
CVE-2021-29047
PUBLISHED: 2021-05-16
The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer.
CVE-2021-22668
PUBLISHED: 2021-05-16
Delta Industrial Automation CNCSoft ScreenEditor Versions 1.01.28 (with ScreenEditor Version 1.01.2) and prior are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.
CVE-2021-29039
PUBLISHED: 2021-05-16
Cross-site scripting (XSS) vulnerability in the Asset module's categories administration page in Liferay Portal 7.3.4 allows remote attackers to inject arbitrary web script or HTML via the site name.