Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Kelihos Botnet Thrives, Despite Takedowns

Fast flux infrastructure and Windows XP infections continue to keep the botnet alive.

Is the Kelihos botnet going bust?

Kaspersky Lab published research Tuesday that showed its sinkholing of one version of the Kelihos (a.k.a. Hlux) botnet 19 months ago with CrowdStrike, the Honeynet Project, and Dell SecureWorks -- as well as subsequent eradication efforts -- have led to a sharp decline in related botnet activity.

"What we see now is what we expected," Kaspersky Lab security researcher Stefan Ortloff wrote in a blog post. "The botnet is getting smaller and smaller -- victims have been disinfecting or reinstalling their PCs over time. At the moment we're counting about 1,000 unique bots on average per month," versus about 116,000 a year ago.

Ortloff said the vast majority of the botnet today is composed of malware-infected systems running Windows XP (86 percent), followed by Windows 7 (7 percent) and Windows Server 2008 R2 (4 percent). Forty-four percent of infected clients are in Poland.

[ Protect your servers without breaking the bank. See Don't Be A Hacker's Puppet. ]

But the Kaspersky Lab report triggered a sharp retort from Hendrik "Rick" Adrian of the white hat security research firm MalwareMustDie. He reported that, as of Wednesday, he was seeing 1,231 Kelihos infections coming just from Poland, placing it well behind the Ukraine (52,825), Russia (18,158), Japan (9,823), and India (6,037), among other countries. In total, Adrian -- part of the ongoing Op Kelihos takedown effort -- said he was seeing at least 100,848 active Kelihos infections as of Wednesday.

Have reports of the botnet's demise been exaggerated? Kaspersky Lab's Global Research and Analysis Team told us via email that the blog post referenced only a single version of Kelihos. "The blog post is a status update on the sinkholing operation we did with our partners in March 2012. We don't have any data or information which botnet in detail MalwareMustDie is referring to," the team wrote. "There are and were several versions of Hlux/Kelihos, some were sinkholed, but others may still be active."

Dave Dittrich, a SANS instructor and security researcher at the University of Washington, told us via email that the decline of the Kelihos strain that Kaspersky Lab helped sinkhole looks legit. "Kaspersky is watching a set of bots that were abandoned, and living for a year and a half is just about what I would have expected, having watched another similarly abandoned botnet (named 'Nugache') in 2008 slowly die out over about a 1.5 year period."

But other versions of Kelihos continue to circulate, he said, thanks in part to "pay per install" (a.k.a. malware-as-a-service) providers wielding malware such as Conficker, Fifesock, RedKit, and Virut.

According to Adrian, Kelihos eradication remains difficult because infected PCs can spread the infection to other PCs (peers) with which they connect, beyond the threat of users simply coming into contact with a Kelihos loader that would infect the system for the first time. "Each [of the] peers has more than 10+ payloads to spread, [and a] smaller number of payloads exists in the loader part."

Kelihos also continues to spread thanks to the botnet automatically creating command-and-control (CnC) domains, he said, as well as through fast flux techniques that hide the botnet's infrastructure behind multiple layers of proxies. From Aug. 6 through Nov. 12, the botnet had generated at least 800 domains via the Russian domain name registrar RegTime.net, including one that was registered Tuesday.

"The above growth is still happening, even now we keep on suspending, sinkholing new domains [that are] used for spreading [the] payload -- which [is] encrypted in their job servers to [the] CnC layer to be sent to [peers] for infection" upgrades, he said. "The effort of current [suppression] is not related [to] the previous shutdown." Rather, the current level of infections results from security researchers coordinating their efforts to continue researching how the botnet operates and sinkholing all related domains.

Who's behind these Kelihos infections? That's not clear, but a significant portion of the attack infrastructure traces to Russia. Last week, a Pastebin post from MalwareMustDie detailed a relationship between domains being used to serve Kelihos payloads and the RedKit exploit kit. A series of RedKit infections have included a JavaScript injection script that points the infected PC to a site based in Russia that uses "the same infrastructure as the Kelihos botnet," according to MalwareMustDie.

This year, attackers -- who might not be part of the Kelihos gang -- loaded the RedKit crimeware pack on to hacked NBC websites and launched driveby attacks exploiting known Java and Adobe Reader vulnerabilities against all site visitors. The exploit pack then installed Citadel financial malware on to vulnerable PCs.

Advanced persistent threats are evolving in motivation, malice, and sophistication. Are you ready to stop the madness? Also in the new, all-digital The Changing Face Of APTs issue of Dark Reading: Governments aren't the only victims of targeted intelligence gathering. Enterprises need to be on guard, too (free registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PaulS681
50%
50%
PaulS681,
User Rank: Apprentice
11/18/2013 | 7:33:15 PM
Re: no surprise
We have some computers that run laser welders and cutters and they need to run XP. I was going to put these on the network but thought better of it for this reason. It's not worth the risk.
aditshar
50%
50%
aditshar,
User Rank: Apprentice
11/18/2013 | 6:43:23 AM
Re: no surprise
I have been reading around for this Botnet, and could see that it's not too hard to spot, any one here who experianced malfunction due to this.
Mathew
50%
50%
Mathew,
User Rank: Apprentice
11/18/2013 | 5:43:29 AM
Re: no surprise
@Paul -- Well put. The quantity of infected XP machines that make up the Kelihos botnet suggest how many of these vulnerable machines are out there, ripe for exploitation, as well as how attackers will continue to tap them as a free and relatively easy to harvest resource.
PaulS681
50%
50%
PaulS681,
User Rank: Apprentice
11/17/2013 | 7:24:19 PM
no surprise
It's no surprise XP is the biggest target. There are many XP machines still out there and they will be major security holes for companies that continue to run them.
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
New Attack Campaigns Suggest Emotet Threat Is Far From Over
Jai Vijayan, Contributing Writer,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5216
PUBLISHED: 2020-01-23
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seei...
CVE-2020-5217
PUBLISHED: 2020-01-23
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_policy_directives, a semicolon could be injected leading to directive injection. This could b...
CVE-2020-5223
PUBLISHED: 2020-01-23
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3...
CVE-2019-20399
PUBLISHED: 2020-01-23
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
CVE-2020-7915
PUBLISHED: 2020-01-22
An issue was discovered on Eaton 5P 850 devices. The Ubicacion SAI field allows XSS attacks by an administrator.