Microsoft, Symantec Torpedo Massive Botnet

  /     /     /  
Publicated : 22/11/2024   Category : security


Microsoft, Symantec Torpedo Massive Botnet


Tech companies team up to take down Bamital botnet, which generated over $1 million annually via search engine click fraud.



Microsoft and Symantec Wednesday announced that they took down the Bamital botnet, which was used by its controllers to amass an estimated $1 million or more per year via click fraud. As part of the takedown effort, dubbed Operation b58, employees from both technology companies -- escorted by U.S. marshals -- seized equipment from hosting facilities in New Jersey and Virginia.
Based on the successes of prior botnet operations, Microsoft and Symantec used a combined legal and technical action to take down Bamital, said Richard Domigues Boscovich, assistant general counsel for the Microsoft Digital Crimes Unit, in a
blog post
.
Boscovich told Reuters, which first
reported
the news of the takedown, that he had a high degree of confidence that the botnet takedown would spell the end of Bamital. We think we got everything, but time will tell, he said.
[ Anonymous hits Wall Street execs in retaliation move for Aaron Swartz case. Read more at
Anonymous Claims Wall Street Data Dump
. ]
The takedown kicked off with Microsoft filing a lawsuit against the Bamital botmasters and requesting that it be allowed to seize their U.S. servers. The court granted Microsofts request and on February 6, Microsoft -- escorted by the U.S. Marshals Service -- successfully seized valuable data and evidence from the botnet, said Boscovich. The evidence was taken from Web-hosting facilities in Virginia and New Jersey.
Microsofts related
complaint
was filed in U.S. District Court for the Eastern District of Virginia on January 31, 2012, supported by a declaration from Symantec, against John Does 1-18, controlling a computer botnet thereby injuring Microsoft and its customers.
The 30-page civil complaint, unsealed Wednesday, accused the defendants of violating the
Computer Fraud and Abuse Act
by illegally accessing Microsoft customers computers. It also accused them of violating the
Electronic Communications Privacy Act
by having knowingly and intentionally accessed Microsoft customers computers and Microsofts computers and servers without authorization, interfering with peoples search engine queries, and intercepting peoples personal information.
In the accompanying 162-page
complaint appendices
, also unsealed Wednesday, Microsoft provided some additional details for the 18 John Does that it said ran the botnet, who were based in Russia, Romania, Australia, Great Britain, and the United States. The court documents also listed thousands of IP addresses that Microsoft said were the command-and-control (C&C)
server addresses
used for the Bamital botnet, which Microsoft said had been registered using fake names.
According to Symantec and Microsoft, in the past two years more than 8 million PCs have been infected by Bamital malware, which perpetrated a click-fraud scheme that rerouted legitimate requests to major search engines, including Google, Microsoft Bing and Yahoo, to attacker-controlled sites. From analysis of a single Bamital C&C server over a six-week period in 2011 we were able to identify over 1.8 million unique IP addresses communicating with the server, and an average of three million clicks being hijacked on a daily basis, read a
blog about the takedown
posted by Symantec.
But people whose PCs were infected with Bamital may not have noticed signs of the malware infection. While the cybercriminals in this case used the Bamital malware to break victims search experience, it was done in such a sneaky way that most victims wouldnt have even noticed a problem while the botnet was still operating, said Boscovich. However, because the takedown severed the cybercriminals ability to manipulate and control Bamital-infected computers, victims will likely become visibly aware that their search function is broken as their search queries will time out. But he said infected PCs queries should now be redirected to a Bamital-removal website hosted by Microsoft and Symantec.
The practice of
click fraud
-- or
click hijacking
-- refers to the practice of rerouting people who click on legitimate search engine results to sites that pay attackers, or their affiliates, for the referral. To perpetrate click fraud, attackers may trick search engines into listing their fake pages.
But by using malware, attackers can instead alter the DNS settings on an infected PC to route all Internet requests through an attacker-controlled server. Such scams may redirect users to fake sites, or display attacker-promulgated banner advertisements over legitimate sites. But the gang who ran Bamital used the botnet in part to infect PCs with their malware, according to Microsofts complaint. Microsoft investigators found that Bamital rerouted a search for Nickelodeon to a website that distributed malware, including spyware that is designed to track the activities of the computer owner, said Boscovich. In another case, our researchers discovered that an official Norton Internet Security page that appears in a list of search results was redirected to a rogue antivirus site that distributes malware.
One of the best-known examples of click fraud to date was the
DNSChanger malware
, which was wielded by an Estonian gang as part of a four-year fraud campaign that amassed an estimated $14 million, before the gang was
busted by Estonian police and the FBI
.
The Bamital takedown marks the sixth time that Microsoft has been involved in a botnet takedown, and the second time that its worked with Symantec to do so. But while affecting a botnet takedown by having a private company file a civil complaint may be a novel legal strategy, its drawn criticism. Notably, Dutch security researchers last year accused Microsoft of
compromising their Zeus botnet investigations
after Microsoft employees, accompanied by U.S. marshals, physically removed -- from two U.S. hosting centers -- C&C servers that were hosting a Zeus botnet.
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready? Also in the new, all-digital
Malwares Next Generation
issue of Dark Reading: The shift in hacking requires a new defense mindset. (Free with registration.)

Last News

▸ Feds probe cyber breaches at JPMorgan, other banks. ◂
Discovered: 23/12/2024
Category: security

▸ Security Problem Growing for Dairy Queen, UPS & Retailers, Back off ◂
Discovered: 23/12/2024
Category: security

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Microsoft, Symantec Torpedo Massive Botnet