Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/20/2008
09:42 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Rival Botnets Share a Common Bond, Researchers Find

But world's biggest botnets Rustock and Srizbi remain autonomous

Two of the world’s largest and most prolific spamming botnets have been spotted sharing a common bot malware-delivery method. But whether that means that the operators of the rival Rustock and Srizbi botnets are actually in cahoots is unclear, security researchers say.

Rustock, which recently edged Srizbi for the top slot as the biggest spammer mostly due to a wave of fake Olympics and CNN news spam, and Srizbi, known for fake video and DVD spam, have been using the same Trojan, Trojan.Exchanger, to download their bot malware updates, researchers say. “This is the first time” we had seen this connection between the two botnets, says Fengmin Gong, chief security content officer for anti-botnet software firm FireEye. “That’s why when we saw it, it was surprising.” (See CNN, Olympics Spam Put Botnet in First Place and Malicious Spam Traffic Triples in One Week.)

“They definitely have a relationship,” he says. “There’s not the rivalry we used to think about.”

But Gong says the speculation by a FireEye researcher in a recent blog post on the vendor’s site that the two botnets are run by one operator -- namely the Russian Business Network -- is not conclusive at this point, however. “We would need more information to conclude that,” he says. “In this instance, at a minimum we can say these two botnets are actually using the same carrier for their updates.”

Other researchers say they have witnessed a recent overlap between Rustock and Srizbi, too. Some say it’s spammers diversifying their spam campaigns with different botnets, and others, that it could be some sort of coordination among the bot herders or their spammer customers. Either way, they all agree that the two botnets remain separate networks of zombies with distinct command and control infrastructures.

“They are not one in the same, although they have some overlap. If you take down one, the other will continue to persist,” says Paul Royal, principal researcher with Damballa.

Royal says the two botnets may be using a common “exchanger” service, a service that puts their malware onto victims’ computers. “That service may spam the emails to put the software on people’s computers,” he says. He says he’s seen similar connections among other botnets, namely Srizbi, Storm, Zlob, and Zbot: “We found in data-mining sample last fall a Trojan dropper... that had downloaded seven different binaries. Among them was Storm and Srizbi.”

Joe Stewart, director of security research for SecureWorks, says the Srizbi-Rustock connection is most likely due to a spammer using both zombie networks -- not that the operators of the two botnets are actually collaborating. “What is confusing people is that you’re seeing Rustock bots sending out emails that essentially infect people with Srizbi, so they think it must be Srizbi that’s sending it, but it’s not,” he says. “Srizbi is not just one big model. It’s rented out to lots of different spammers."

A major spammer may be trying to diversify by using the two botnets, he says. “It could be because they want to separate their malware-seeding operation from their spamming operation,” Stewart says. “Maybe their bots are getting blacklisted faster when they’re sending out URLs with fake video files because they’re easy to spot, so their spam doesn’t get through. So they send malware from this botnet, and spam from this one, to keep out of the blacklists longer.”

And given that botnets are constantly evolving -- shrinking, growing, and segmenting -- it’s tough to get an accurate or up-to-date read on their relationships, anyway. “They are very much a moving target,” says Glen Myers, an engineer with Marshal.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Damballa Inc.
  • FireEye Inc.
  • SecureWorks Inc.
  • Marshal Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Navigating Security in the Cloud
    Diya Jolly, Chief Product Officer, Okta,  12/4/2019
    4 Tips to Run Fast in the Face of Digital Transformation
    Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: Our Endpoint Protection system is a little outdated... 
    Current Issue
    The Year in Security: 2019
    This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2013-4245
    PUBLISHED: 2019-12-11
    Orca has arbitrary code execution due to insecure Python module load
    CVE-2013-4593
    PUBLISHED: 2019-12-11
    RubyGem omniauth-facebook has an access token security vulnerability
    CVE-2013-6495
    PUBLISHED: 2019-12-11
    JBossWeb Bayeux has reflected XSS
    CVE-2013-7370
    PUBLISHED: 2019-12-11
    node-connect before 2.8.2 has cross site scripting in methodOverride Middleware
    CVE-2019-18935
    PUBLISHED: 2019-12-11
    Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote cod...