Vulnerabilities / Threats

10/22/2018
04:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

US Tops Global Malware C2 Distribution

The United States hosts 35% of the world's command-and-control infrastructure, driving the frequency of host compromises.

Nearly 30% of network indicators of compromise (IoCs) from phishing-borne malware in 2018 leveraged command-and-control (C2) infrastructure located in, or proxied through, the United States, which is the leader in global malware C2 distribution, Cofense reports.

The US hosts 35% of global C2 infrastructure, followed by Russia (11%), the Netherlands (5%), Germany (5%), and Canada (3%). C2 infrastructure is "enormously biased" toward compromised hosts, which signifies high frequency of host compromises in the US.

Cofense Intelligence researchers who made the discovery say this doesn't mean people in the US are disproportionately hit with malware via phishing. It does support the idea that cyberattackers avoid arrest and/or extradition by hosting C2 infrastructure outside their countries of residence, or in nations with which their home countries have extradition agreements.

Cofense's research focuses on C2 infrastructure, which attackers use to communicate and control malware: new modules to download, commands to execute, or where to send stolen data. The fact that more C2 infrastructure is hosted in the US doesn't necessarily mean more people are targeted there.

"It is not at all uncommon for C2 to be hosted or proxied through intermediary countries before reaching a target's inbox," says Darrel Rendell, principal intelligence analyst at Cofense.

Consider the wealth of Internet infrastructure in the US, he adds. Threat actors gravitate toward broad attack surfaces, and the US has more hosts to compromise. Most attackers don't have a specific country in mind. They want to act where infrastructure is available.

"Threat actors are likely motivated by opportunity," Rendell explains. "There could be strategic opportunities across certain connections from certain countries that may be automatically blocked. For example, some organizations will block any connections coming from countries known for the origination of malicious activity that they do not do business with."

More specifically, he continues, an organization that doesn't do business in a specific country may block or scrutinize connections with those countries. Communications to and from US-based infrastructure may not be blocked or raise any red flags from security tools.

TrickBot and Geodo: Patterns, Predictions
Researchers illustrate the significance of C2 location with Geodo and TrickBot. Both are common modular banking Trojans targeting Western users but come from different malware families and are likely operated by different actors. Researchers analyzed the juxtaposition in C2 locations between TrickBot and Geodo Tier 1 proxy nodes throughout 2018.

Some potential overlap exists between the two, Darrell says, noting that Geodo has been seen delivering TrickBot in the past. Both Trojans proved to be growing threats earlier this year, ramping up the frequency and variety of their delivery mechanisms, utilities, and behaviors.

Geodo uses legitimate Web servers as a reverse proxy, sending traffic through actual servers to hosts on hidden C2 infrastructure. TrickBot almost exclusively uses for-purpose virtual private servers to host malicious infrastructure. Its C2 distribution trends eastward, and its campaigns consistently target Western victims, Cofense researchers explain.

TrickBot's tendency to do so could be due to a lack of extradition agreements among those countries, they point out. However, TrickBot does use some C2 locations in North America and Western Europe, a sign that attackers could be using a variety of C2 locations to make it more difficult to profile TrickBot's infrastructure.

Researchers are keeping an eye on how the two threats move and evolve.

"Geodo and TrickBot activity changes with each iteration," Darrell sats. "Over the last two weeks, for example, Geodo has been quieter than usual. While it isn't uncommon for it to go quiet for a period of time and resurface, this lull seems longer than usual."

He suggests the downtime is a result of operators improving Geodo's capabilities. The threat is still communicating with its C2 but so far has not been seen receiving any commands to update or propagate. TrickBot underwent a similar quiet period, he explains, after which researchers observed "significant changes" to the encryption of its modules and configuration files.

Looking ahead, researchers say the varied C2 locations for Geodo and TrickBot show how their infrastructure is growing. The two families "will almost certainly" be around in coming months.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MelBrandle
50%
50%
MelBrandle,
User Rank: Apprentice
10/31/2018 | 3:11:59 AM
That is a huge coverage
That is a huge coverage and obviously such a massive hosting would mean dragging along with it the extensive array of compromises as well. This fact does not necessarily mean that the process would only produce problems but it simply means that they would need to step up precautionary measures. Early implementation can be put in place even before no major situation has ever occurred just yet.
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19355
PUBLISHED: 2018-11-19
modules/orderfiles/ajax/upload.php in the Customer Files Upload addon 2018-08-01 for PrestaShop (1.5 through 1.7) allows remote attackers to execute arbitrary code by uploading a php file via modules/orderfiles/upload.php with auptype equal to product (for upload destinations under modules/productfi...
CVE-2008-7320
PUBLISHED: 2018-11-18
** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.
CVE-2018-19358
PUBLISHED: 2018-11-18
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig...
CVE-2018-19351
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHand...
CVE-2018-19352
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.