8/20/2008
09:42 AM
Connect Directly
Twitter
RSS
E-Mail

Rival Botnets Share a Common Bond, Researchers Find

But world's biggest botnets Rustock and Srizbi remain autonomous



Two of the world’s largest and most prolific spamming botnets have been spotted sharing a common bot malware-delivery method. But whether that means that the operators of the rival Rustock and Srizbi botnets are actually in cahoots is unclear, security researchers say.

Rustock, which recently edged Srizbi for the top slot as the biggest spammer mostly due to a wave of fake Olympics and CNN news spam, and Srizbi, known for fake video and DVD spam, have been using the same Trojan, Trojan.Exchanger, to download their bot malware updates, researchers say. “This is the first time” we had seen this connection between the two botnets, says Fengmin Gong, chief security content officer for anti-botnet software firm FireEye. “That’s why when we saw it, it was surprising.” (See CNN, Olympics Spam Put Botnet in First Place and Malicious Spam Traffic Triples in One Week.)

“They definitely have a relationship,” he says. “There’s not the rivalry we used to think about.”

But Gong says the speculation by a FireEye researcher in a recent blog post on the vendor’s site that the two botnets are run by one operator -- namely the Russian Business Network -- is not conclusive at this point, however. “We would need more information to conclude that,” he says. “In this instance, at a minimum we can say these two botnets are actually using the same carrier for their updates.”

Other researchers say they have witnessed a recent overlap between Rustock and Srizbi, too. Some say it’s spammers diversifying their spam campaigns with different botnets, and others, that it could be some sort of coordination among the bot herders or their spammer customers. Either way, they all agree that the two botnets remain separate networks of zombies with distinct command and control infrastructures.

“They are not one in the same, although they have some overlap. If you take down one, the other will continue to persist,” says Paul Royal, principal researcher with Damballa.

Royal says the two botnets may be using a common “exchanger” service, a service that puts their malware onto victims’ computers. “That service may spam the emails to put the software on people’s computers,” he says. He says he’s seen similar connections among other botnets, namely Srizbi, Storm, Zlob, and Zbot: “We found in data-mining sample last fall a Trojan dropper... that had downloaded seven different binaries. Among them was Storm and Srizbi.”

Joe Stewart, director of security research for SecureWorks, says the Srizbi-Rustock connection is most likely due to a spammer using both zombie networks -- not that the operators of the two botnets are actually collaborating. “What is confusing people is that you’re seeing Rustock bots sending out emails that essentially infect people with Srizbi, so they think it must be Srizbi that’s sending it, but it’s not,” he says. “Srizbi is not just one big model. It’s rented out to lots of different spammers."

A major spammer may be trying to diversify by using the two botnets, he says. “It could be because they want to separate their malware-seeding operation from their spamming operation,” Stewart says. “Maybe their bots are getting blacklisted faster when they’re sending out URLs with fake video files because they’re easy to spot, so their spam doesn’t get through. So they send malware from this botnet, and spam from this one, to keep out of the blacklists longer.”

And given that botnets are constantly evolving -- shrinking, growing, and segmenting -- it’s tough to get an accurate or up-to-date read on their relationships, anyway. “They are very much a moving target,” says Glen Myers, an engineer with Marshal.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Damballa Inc.
  • FireEye Inc.
  • SecureWorks Inc.
  • Marshal Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Copyright © 2021 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service