Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:54 PM
Connect Directly

Deja Vu: Reincarnated Botnet Struck Down

Researchers at Kaspersky Lab, CrowdStrike, and Dell SecureWorks intercept bots from infamous spamming botnet -- but this time without the help of Microsoft and its legal team

The hard-to-kill Kelihos/Hlux botnet -- now in its second and much larger version -- was crippled and shut down over the past few days by a team of researchers from Kaspersky Lab, CrowdStrike, Dell SecureWorks, and The Honeynet Project.

The researchers announced today that they had wrested control of the botnet, the descendent of the infamous Storm botnet, by poisoning the peer-to-peer network-based botnet with their own code, which ultimately diverted some 110,000 infected machines to their sinkhole server and out of the hands of the botnet operators.

Kelihos/Hlux (a.k.a. Hlux/Kelihos), which was taken down in the fall by Microsoft, Kaspersky, and researchers from several other organizations, had been spotted by researchers re-emerging over the past few months with a new version of its malware. The so-called Hlux.B/Kelihos.B, also a peer-to-peer botnet, was built for spamming, information-stealing, and some DDoS activity like its predecessors, but also came with an new function -- stealing Bitcoins and electronic wallets, as well as a flash-drive infection capability, according to the researchers. It was about three times as large as the first Hlux/Kelihos botnet.

But this time, Microsoft and its legal team weren't part of the operation. Kaspersky and CrowdStrike did not explain why, but acknowledged that they did not use legal force this time around. Microsoft has been on an aggressive litigation-based campaign against botnets during the past year, with its latest conquest of a massive Zeus botnet operation it announced earlier this week that allowed the software giant to physically seize command-and-control (C&C) servers.

"We commend Kaspersky and their industry partners for their action against the new Kelihos.b botnet. There is clearly a strong momentum happening in the fight against botnets. Cybercriminals should take recent disruptive events as a clear warning that private industry, law enforcement and the security community are on the move and it’s time for criminals to find a different, legitimate line of business," said Richard Boscovich, senior attorney in the Microsoft Digital Crimes Unit, in a statement.

Some security experts question whether the nonlegal route taken this time will be as effective, and there's still the bigger problem of not capturing the bad guys behind the botnet. The alleged botmaster, Andrey N. Sabelnikov, who was named in a legal filing by Microsoft, remains at large. Microsoft says Sabelnikov lives in St. Petersburg, Russia, is a contractor for a software development and consulting firm, and once worked as a software engineer and project manager at a firewall and antivirus firm, which was later identified in press reports as Agnitum.

Security experts agree that dismantling botnets is a game of whack-a-mole unless the bad guys are caught. "Taking down a botnet without capturing the bot masters/herders and malware authors is essentially the same as seizing guns from criminals without any arrests. A criminal can always find more guns," says Jerry Tubbs, CTO of Unveillance, which provides botnet and data-leakage monitoring services for enterprises.

And Kaspersky and CrowdStrike researchers do expect the criminals behind Hlux/Kelihos to keep trying to reinvent their botnet operation. "We can say we expect to see a new version as well," said Tillman Werner, senior research scientist at CrowdStrike, in a press briefing today detailing the latest takedown.

Hlux.B/Kelihos.B was designed to encrypt HTTP and Port 80 C&C traffic, and two layers of obfuscation for its binary code. Like previous versions, it uses a sophisticated layered architecture that keeps the botnet operators well-hidden, as well as the C&C servers. "It's a fairly complex architecture," Werner said.

So how did the researchers take down the botnet? "We have injected false information into the botnet ... fake job server lists that all pointed to our sinkhole machine, which then talks to the bots and makes sure they can't talk to [any other botnet]," Tillman said.

This botnet is known for its relative size, prolific spamming capabilities, as well as its staying power: It's technically in its fifth version, and it has a long history of being hunted and reinventing itself. It started out as the massive Storm botnet back in 2007, which later was replaced by Waledac (later taken down by researchers), then a short-lived Storm2 that was snuffed out before it got off the ground, and, most recently, the Kelihos/Hlux versions. What set this latest version apart is that it about five times bigger than the previous Kelihos version, and with its Bitcoin-stealing features, is not just for spamming and DDoSing anymore.

Most of the victims were in Poland, which had about one-fourth of the bots, followed by the U.S. (10.8 percent), Turkey (5 percent), Spain (3.7 percent), India (3.4 percent), Argentina (3.1 percent), Mexico (3.1 percent), Romania (2.9 percent), Bulgaria (2.6 percent), and the Ukraine (2.5 percent). The bulk of the infected machines were Windows XP-based, with 91,950 infections, followed by Windows 7, with 9,428, and Windows 7 SP1, with 5,335 infections.

Next Page: The botnet operators fight back Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

1 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-27
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even witho...
PUBLISHED: 2020-09-27
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an uploa...
PUBLISHED: 2020-09-27
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> ...