Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Doman Generation Algorithms Quietly On The Rise, Researcher Says

Thought to be dead, DGAs are increasingly being used for botnet command and control, Damballa says

The obfuscation method used by Conficker and some more recent botnets is still being used -- and, in fact, is on the rise among botnets, according to new research.

According to a blog by Gunter Ollmann, vice president of research at Damballa, the use of Domain Generation Algorithms (DGAs) is quietly increasing.

DGAs allow botnet operators to hide their command-and-control (C&C) servers from signature-based security tools by using an algorithm to reach out dynamically to a number of servers, rather than using static servers that can be easily located, Ollmann observes. This reaching-out process creates a great deal of noise and false positives on security systems that is largely ignored today, he notes.

"DGAs are a pain -- they’re supposed to be," Ollmann writes. "They exist to defeat network detection and blocking technologies, and they did it really well. Today, they’re doing it even better."

The Damballa research team raises four key points about Domain Generation Algorithms:

>> DGAs aren’t dead. Instead, they’re being added to already-stealthy crimeware at an alarming rate.

>> DGAs are being adopted as backup strategies. Even if the crimeware family is well-known and its traditional C&C infrastructure is blocked or disabled [by security tools], the DGA fallback plan is kicking in and allowing the crimeware to receive new instructions and upload stolen data.

>> C&C servers are becoming more agile. The criminal operators behind the DGA-based crimeware are exposing their C&C servers for the minimum amount of time. Domains are registered and DNS configurations are made "just in time" (i.e., a few minutes before the algorithm is supposed to call the domain), and the C&C servers are shut down and removed immediately afterward -- something that can be done in less than an hour.

>> Dynamic analysis and auto-generated signature systems can't detect DGAs. Automated systems that perform dynamic malware analysis on the DGA-based crimeware are producing irrelevant detection signatures, Damballa says. By the time the crimeware passes through the analysis and a signature is deployed for alerting/blocking, the crimeware family is already on to the next C&C server possibility.

In its research, Damballa developed a method for detecting DGAs that has not been used before, which is what gave rise to its report on the increased use of the technology, Ollmann says. But the fact that DGAs can now be detected probably won't prevent the bad guys from continuing to employ them, he states.

"The technique is stealthier than any other they have in their arsenal and will continue to work against the traditional/legacy network protection platforms for a long time to come," Ollmann writes.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jries921
50%
50%
jries921,
User Rank: Ninja
3/12/2012 | 5:56:04 PM
re: Doman Generation Algorithms Quietly On The Rise, Researcher Says
Wasn't this particular technique pioneered by spammer Alan Ralsky (now in prison)?
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14905
PUBLISHED: 2020-03-31
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS co...
CVE-2020-11441
PUBLISHED: 2020-03-31
phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page.
CVE-2020-1712
PUBLISHED: 2020-03-31
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sen...
CVE-2019-10180
PUBLISHED: 2020-03-31
A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could...
CVE-2019-14880
PUBLISHED: 2020-03-31
A vulnerability was found in Moodle versions 3.7 before 3.7.3, 3.6 before 3.6.7, 3.5 before 3.5.9 and earlier. OAuth 2 providers who do not verify users' email address changes require additional verification during sign-up to reduce the risk of account compromise.