Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/11/2008
06:52 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

An Inside Look at the Russian Business Network

New white paper gives insight on Russian Business Network activities

A new white paper published by the nonprofit botnet-tracker Shadowserver Foundation sheds some light on one segment of activity on the Russian Business Network (RBN). (See Russian Business Network Disappears.)

Shadowserver released its findings on malware associated with the so-called AS40989 group of interconnected IP networks on the RBN. Shadowserver gathered nearly 3,000 sample pieces of malware -- including Gozi, Goldun, Hupigon, Nurech, Nuklus, Pinch, Sinowal, Tibs, Xorpix, as well as dialers, downloaders, worms, adware, page hijackers, and proxies -- that communicated with the AS40989 network via HTTP connections.

Security experts say RBN -- which recently disappeared off the Internet in what could be a retrenching move -- serves as an ISP and hosting service for Websites that deal in spam, identity theft, and other illegal activities. RBN in an interview with Wired last fall said that it's misunderstood, and denied wrongdoing.

Shadowserver observed in its research on RBN that RBN malware hosts appear to be professionally managed. "By 'professional' it is meant that rarely are malware back-ends misconfigured or open to inspection and, rarely do they generate errors or move from host to host," according to the report.

And RBN's business model was based on distributing software for spamming and stealing personal data, Shadowserver says. The nonprofit also makes a case for going public sooner about "known rogue networks, ASPs and ISPs" such as RBN.

"The initial audience of this paper knew about RBN and its practices long before any effective action was taken to remove the general threat it posed," Shadowserver says in its paper. And "breeding an atmosphere of intolerance toward networks which harbor criminal activities can be achieved with minimal to no impact to ongoing criminal investigations," the report says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17448
PUBLISHED: 2020-08-11
Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.
CVE-2020-17466
PUBLISHED: 2020-08-11
Turcom TRCwifiZone through 2020-08-10 allows authentication bypass by visiting manage/control.php and ignoring 302 Redirect responses.
CVE-2020-11552
PUBLISHED: 2020-08-11
An elevation of privilege vulnerability exists in ManageEngine ADSelfService Plus before build 6003 because it does not properly enforce user privileges associated with a Certificate dialog. This vulnerability could allow an unauthenticated attacker to escalate privileges on a Windows host. An attac...
CVE-2020-13124
PUBLISHED: 2020-08-11
SABnzbd 2.3.9 and 3.0.0Alpha2 has a command injection vulnerability in the web configuration interface that permits an authenticated user to execute arbitrary Python commands on the underlying operating system.
CVE-2020-15597
PUBLISHED: 2020-08-11
SOPlanning 1.46.01 allows persistent XSS via the Project Name, Statutes Comment, Places Comment, or Resources Comment field.