Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/1/2007
04:45 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Dismantling a Botnet

Lopping off its head won't kill a botnet - and the bots may never truly be free

Just because you arrest a spam kingpin doesn't mean his botnet is history. (See Spamless in Seattle.)

The arrest of Robert Soloway, the so-called "Spam King" who commanded a botnet of zombies that reportedly sent out billions of spam email messages every day, is a case study in just how difficult killing a botnet can be. His capture does not equate to the release of thousands of newly healthy client machines that may once have been his infected hostages.

"You are basically cutting a tapeworm in two. The infrastructure is still there, and it can be picked up by anyone who can find it or knows where it is," says Ira Winkler, author of Zen and the Art of Information Security. "Authorities might be able to see what servers he connects to that command the rest of the bots, but it is unlikely that they will kill all of the bots."

Researchers say Soloway had his own botnet for spamming -- not for launching denial-of-service attacks like some botnets do, nor was it part of one of the infamous botnet "gangs" out there. And everyone was watching him and his movements. "The botnet wasn't terribly sophisticated, but it was custom enough that it sort of stood out," says Jose Nazario, software and security engineer for Arbor Networks. "It seemed to be primarily his own botnet, and he [probably] had a couple of guys in contract helping him out. People had their eye on him for quite a while."

Even if authorities try to shut down his botnet, there are plenty more wanna-be spam kings and botherders waiting in the wings who probably already are snapping up the infected bots Soloway used, researchers say. "There's always someone there ready to fill the void," says Joe Stewart, senior security researcher for SecureWorks. "I don't expect to see a decrease of spam in my inbox."

Even if Soloway's bots are freed, the machines are likely still infected, so another botherder can re-hijack them for his own botnet. "It's easy to steal someone else's bots," Arbor's Nazario says. Even scarier is if your machine just so happened to be one of a Soloway bot, it may already have been recruited as a member of another botnet and you wouldn't even know it, according to Nazario.

So how do you dismantle a botnet? It's no easy task, and it requires infiltration of the botnet. SecureWorks's Stewart says the most effective way to take down a botnet is to go after the actual hands-on operation, and that's not the spam king. "There's always a central server or some sort of central control mechanism, even if it's a peer-to-peer network. Someone has the keys to control it all."

That means taking down the command and control, or master, server. "Now all the zombies are dead and defunct because they can't send mail if they don't have contact with their master server," he says. For peer-to-peer botnets -- a distributed setup where each bot can send its commands on its own so it's difficult to pinpoint the source of the command and control -- you have to "convince" the controller to shut down the botnet operation, he says.

"There's usually a way to build in an update to their software to convince them it's time to shut down," Stewart explains. "If you take away that person and their controlling of the botnet and get a list of all these infected machines before they are resold," then you have a shot at taking it down.

The key is chipping away at the guys in the trenches. "It's good to get rid of a spam kingpin. But you need to know where he's getting his services from," Stewart says.

Trouble is, many of the worker-bee spammers are in countries like China and Russia, out of the reach of U.S. law enforcement, Stewart says. "It's a global economy here in the spam underworld."

And investigators and ISPs are often in a quandary over whether to shut down a botnet altogether for fear of inadvertently sabotaging an investigation of a researcher or another law-enforcement official, for instance. (See Battling Bots, Doing No Harm.)

Winkler says to truly dismantle a botnet, you need to not only find the servers that the root commands, but also find the bot-infected end systems themselves. "If you observe the behavior of the bot servers to see what systems they connect to, you can then try to get the ISPs to tell the owners to clean up all the systems, which is the most work."

Nazario says he doesn't have any firsthand knowledge that law enforcement officials are completely killing the Spam King's botnet. That would take studying the tools and techniques he used, and then the monumental task of getting antivirus and OS vendors to provide signatures to remove his malware. "That would be a major event," he says. "They [vendors] have so many things on their plate that they have to triage and prioritize them."

Shutting down a botnet usually requires not only taking down command and control servers, but with a quick, coordinated effort of officials around the globe, says Kris Kendall, principal consultant for Mandiant. "That's a hard problem," he says. "Battling botherders on their own turf is challenging."

Investigators into the Soloway botnet may instead want to monitor it and see who's using it and how. "They could sit where he would and watch who's using it and follow them," Nazario says. "That way they could find out more about the spamming underworld and his underworld."

So the bots from Soloway's botnet aren't in the clear yet. His arrest was really more symbolic: "They were really looking to send a message to other spammers that they are being watched and can be caught. Until we start seeing a large number of these arrests on fairly regular basis, it's not going to have a significant impact," Stewart says.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • SecureWorks Inc.
  • Arbor Networks Inc.
  • Mandiant Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    How to Better Secure Your Microsoft 365 Environment
    Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
    Attackers Leave Stolen Credentials Searchable on Google
    Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-3331
    PUBLISHED: 2021-01-27
    WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
    CVE-2021-3326
    PUBLISHED: 2021-01-27
    The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
    CVE-2021-22641
    PUBLISHED: 2021-01-27
    A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
    CVE-2021-22653
    PUBLISHED: 2021-01-27
    Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
    CVE-2021-22655
    PUBLISHED: 2021-01-27
    Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).