Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Doman Generation Algorithms Quietly On The Rise, Researcher Says

Thought to be dead, DGAs are increasingly being used for botnet command and control, Damballa says

The obfuscation method used by Conficker and some more recent botnets is still being used -- and, in fact, is on the rise among botnets, according to new research.

According to a blog by Gunter Ollmann, vice president of research at Damballa, the use of Domain Generation Algorithms (DGAs) is quietly increasing.

DGAs allow botnet operators to hide their command-and-control (C&C) servers from signature-based security tools by using an algorithm to reach out dynamically to a number of servers, rather than using static servers that can be easily located, Ollmann observes. This reaching-out process creates a great deal of noise and false positives on security systems that is largely ignored today, he notes.

"DGAs are a pain -- they’re supposed to be," Ollmann writes. "They exist to defeat network detection and blocking technologies, and they did it really well. Today, they’re doing it even better."

The Damballa research team raises four key points about Domain Generation Algorithms:

>> DGAs aren’t dead. Instead, they’re being added to already-stealthy crimeware at an alarming rate.

>> DGAs are being adopted as backup strategies. Even if the crimeware family is well-known and its traditional C&C infrastructure is blocked or disabled [by security tools], the DGA fallback plan is kicking in and allowing the crimeware to receive new instructions and upload stolen data.

>> C&C servers are becoming more agile. The criminal operators behind the DGA-based crimeware are exposing their C&C servers for the minimum amount of time. Domains are registered and DNS configurations are made "just in time" (i.e., a few minutes before the algorithm is supposed to call the domain), and the C&C servers are shut down and removed immediately afterward -- something that can be done in less than an hour.

>> Dynamic analysis and auto-generated signature systems can't detect DGAs. Automated systems that perform dynamic malware analysis on the DGA-based crimeware are producing irrelevant detection signatures, Damballa says. By the time the crimeware passes through the analysis and a signature is deployed for alerting/blocking, the crimeware family is already on to the next C&C server possibility.

In its research, Damballa developed a method for detecting DGAs that has not been used before, which is what gave rise to its report on the increased use of the technology, Ollmann says. But the fact that DGAs can now be detected probably won't prevent the bad guys from continuing to employ them, he states.

"The technique is stealthier than any other they have in their arsenal and will continue to work against the traditional/legacy network protection platforms for a long time to come," Ollmann writes.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
3/12/2012 | 5:56:04 PM
re: Doman Generation Algorithms Quietly On The Rise, Researcher Says
Wasn't this particular technique pioneered by spammer Alan Ralsky (now in prison)?
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbname parameter.
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter.
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbpassword parameter.
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php tableprefix parameter.