Rival Botnets Share a Common Bond, Researchers FindBut world's biggest botnets Rustock and Srizbi remain autonomous
Two of the worlds largest and most prolific spamming botnets have been spotted sharing a common bot malware-delivery method. But whether that means that the operators of the rival Rustock and Srizbi botnets are actually in cahoots is unclear, security researchers say.
Rustock, which recently edged Srizbi for the top slot as the biggest spammer mostly due to a wave of fake Olympics and CNN news spam, and Srizbi, known for fake video and DVD spam, have been using the same Trojan, Trojan.Exchanger, to download their bot malware updates, researchers say. This is the first time we had seen this connection between the two botnets, says Fengmin Gong, chief security content officer for anti-botnet software firm FireEye. Thats why when we saw it, it was surprising. (See CNN, Olympics Spam Put Botnet in First Place and Malicious Spam Traffic Triples in One Week.)
They definitely have a relationship, he says. Theres not the rivalry we used to think about.
But Gong says the speculation by a FireEye researcher in a recent blog post on the vendors site that the two botnets are run by one operator -- namely the Russian Business Network -- is not conclusive at this point, however. We would need more information to conclude that, he says. In this instance, at a minimum we can say these two botnets are actually using the same carrier for their updates.
Other researchers say they have witnessed a recent overlap between Rustock and Srizbi, too. Some say its spammers diversifying their spam campaigns with different botnets, and others, that it could be some sort of coordination among the bot herders or their spammer customers. Either way, they all agree that the two botnets remain separate networks of zombies with distinct command and control infrastructures.
They are not one in the same, although they have some overlap. If you take down one, the other will continue to persist, says Paul Royal, principal researcher with Damballa.
Royal says the two botnets may be using a common exchanger service, a service that puts their malware onto victims computers. That service may spam the emails to put the software on peoples computers, he says. He says hes seen similar connections among other botnets, namely Srizbi, Storm, Zlob, and Zbot: We found in data-mining sample last fall a Trojan dropper... that had downloaded seven different binaries. Among them was Storm and Srizbi.
Joe Stewart, director of security research for SecureWorks, says the Srizbi-Rustock connection is most likely due to a spammer using both zombie networks -- not that the operators of the two botnets are actually collaborating. What is confusing people is that youre seeing Rustock bots sending out emails that essentially infect people with Srizbi, so they think it must be Srizbi thats sending it, but its not, he says. Srizbi is not just one big model. Its rented out to lots of different spammers."
A major spammer may be trying to diversify by using the two botnets, he says. It could be because they want to separate their malware-seeding operation from their spamming operation, Stewart says. Maybe their bots are getting blacklisted faster when theyre sending out URLs with fake video files because theyre easy to spot, so their spam doesnt get through. So they send malware from this botnet, and spam from this one, to keep out of the blacklists longer.
And given that botnets are constantly evolving -- shrinking, growing, and segmenting -- its tough to get an accurate or up-to-date read on their relationships, anyway. They are very much a moving target, says Glen Myers, an engineer with Marshal.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio