Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

8/6/2008
08:20 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Malicious Botnet Stole Bank, Credit Union Credentials

New report says the 50 GB of data stolen were only one fourth of the data harvested

BLACK HAT USA, LAS VEGAS -- The researcher who first discovered a motherlode of stolen enterprise user names and passwords in June has found that nearly 9,000 of them are bank and credit-card account credentials from around the world that were grabbed by an old but crafty botnet. And it turns out the initial 50 gigabytes' worth of data that included 463,582 passwords on the crime server is only about one-fourth of the total number of accounts stolen by the so-called Coreflood botnet. (See Researchers Raise Alarm Over New Iteration of Coreflood Botnet and SecureWorks Finds Massive Cache of Stolen Data.)

Coreflood is an unusual botnet in that it’s closely held by its operators, who use the data themselves rather than sell it like other botnets do, and also use their own Trojan malware for the botnet. Joe Stewart, director of malware research for SecureWorks, today revealed in a new report some key details of the type and amount of data stored on the crimeware server, which has since relocated to Russia after being shut down in Wisconsin, he says.

Stewart said he has been able to discern how the command and control server was configured, as well as glean clues of the identities of the bad guys behind Coreflood: he says he believes they are directly connected to the Joe Lopez case of 2004, where Miami businessman sued his bank after his account was compromised by the Coreflood Trojan.

“Coreflood is trying to steal financial information, and has stayed under the radar pretty well. It’s not in-your-face sending out emails,” Stewart says.

Stewart says 50 gigabytes of stolen user data were left behind on the crime server he first discovered, but about four times that amount of additional stolen data had been harvested and deleted, according to some new investigation he did via scripts the bad guys left on the server. He says Coreflood stole a gigabyte or more of data each day from all the users combined and also lifted PKI certificates and cookie files.

He was able to verify that the Coreflood operators used the command-and-control server as their base of operations. Among the organizations victimized by Coreflood were a major U.S. university hospital, with nearly 5,000 infected machines; a county school system, with 31,000 bots; a hotel chain, with over 14,000 bots; as well as mortgage, pharmaceutical, oil, and chemical companies. Coreflood even infected 315 machines in a state policy agency in the U.S., according to Stewart’s new data.

“[Coreflood’s operators] are very interested in the name of your company and the copy your Windows machine is registered to. They are very aware of who they are infecting,” Stewart says.

But interestingly, they left behind some evidence of their infecting the state policy agency, which means they may not be fully aware of all of the victims and their data. “They are getting police officers logging into law enforcement databases doing criminal investigations. There’s a lot more data than they realize in there,” he says.

Aside from some drive-by infections, the Coreflood botnet sets a trap inside an organization by infecting the domain administrator’s account -- either directly, or via an infected client machine he logs into. “Then the bot does an administrative rollout of itself to the enterprise” to automatically infect as many machines as it can, Stewart says. “It sits there and waits, setting a trap for the domain admin… they are very patient.”

The less-malicious but pervasive Storm botnet, meanwhile, is apparently trying out some new things, which Stewart will outline in a presentation here today. “For the first time we’re starting to see Storm use peer-to-peer like BitTorrent to get new users, then it can steal their address books and get more” potential victims, he says.

Stewart says he’s also seen Storm conducting more distributed denial-of-services attacks. “We saw that happening in the middle of last year, but then it just stopped. A month ago, we started to see it picking up again, with DDOS commands with specific targets,” Stewart says.

“I was surprised how little the actual protocols and encryption had changed over time… I would expect them to change up the encryption key at least,” he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • SecureWorks Inc. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
    Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
    The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
    Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
    GitHub Named in Capital One Breach Lawsuit
    Dark Reading Staff 8/14/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    The State of IT Operations and Cybersecurity Operations
    The State of IT Operations and Cybersecurity Operations
    Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-15237
    PUBLISHED: 2019-08-20
    Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.
    CVE-2019-15228
    PUBLISHED: 2019-08-20
    FUEL CMS 1.4.4 has XSS in the Create Blocks section of the Admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account but can also impact unauthenticated visitors.
    CVE-2019-15229
    PUBLISHED: 2019-08-20
    FUEL CMS 1.4.4 has CSRF in the blocks/create/ Create Blocks section of the Admin console. This could lead to an attacker tricking the administrator into executing arbitrary code via a specially crafted HTML page.
    CVE-2019-15231
    PUBLISHED: 2019-08-20
    Webmin 1.890, in a default installation, contains a backdoor that allows an unauthenticated attacker to remotely execute commands. This is different from CVE-2019-15107. NOTE: as of 2019-08-19, the vendor reports that "at some point" malicious code was inserted into their build infrastruct...
    CVE-2019-15232
    PUBLISHED: 2019-08-20
    Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.