backtop


Print 79 comment(s) - last by EricMartello.. on Jul 6 at 10:48 PM

TDL-4 detects and disables other malware to hide itself

Over the last year, there have been a number of high profile takedowns of botnets. These takedowns lead to a significant reduction in the amount of spam that computer users see in their inbox.

Security researchers are talking about a new botnet called TDL-4 and they say that it is virtually indestructible. The designers of the botnet used some ingenious methods to ensure that their net isn't as easy to take offline as previous botnets.

Security researcher Sergey Golovanod from Kapersky Labs said in a report on the TDL-4 botnet, "[TDL-4 is] the most sophisticated threat today." Joe Stewart is a malware researcher at Dell SecureWorks, he said, "I wouldn't say it's [TDL-4] perfectly indestructible, but it is pretty much indestructible. It does a very good job of maintaining itself."

There are several factors that work together to make TDL-4 so robust. One of the factors is that the malware infects the master boot record of the computers HDD it resides on. This is the first sector of the hard drive read when a computer starts and the malware rootkit is installed there. That makes the rootkit invisible to security software and the OS.

The thing that makes the botnet even more robust is the method that it uses to communicate with infected computers from the command and control servers. The TDL-4 botnet uses a public peer-to-peer network called the Kad P2P network for one of the two channels it uses to communicate between infected machines and the C&C servers.

Kapersky researcher Roek Schouwenberg wrote in an email to Computerworld, "The way peer-to-peer is used for TDL-4 will make it extremely hard to take down this botnet. The TDL guys are doing their utmost not to become the next gang to lose their botnet."

The hackers behind the botnet also use their own encryption algorithm and use the domain names of the C&C servers as the encryption keys. The use of a public network is the key to the robust botnet and helps ensure the TDL-4 network remains online.

Schouwenberg said, "Any attempt to take down the regular C&Cs can effectively be circumvented by the TDL group by updating the list of C&Cs through the P2P network. The fact that TDL has two separate channels for communications will make any take-down very, very tough."

So far, the TDL-4 botnet is very effective with an estimated 4.5 million Windows computers currently infected. Stewart said, "The 4.5 million is not surprising at all. It [TDL-4] might not have as high an infection rate as other botnets, but its longevity means that as long as they can keep infecting computers and the discovery rate is small, they'll keep growing it."

Another key to the longevity of the TDL-4 malware is the fact that it finds and disables other malware on the computer. This is done because the less likely the user is to know of any infection on their computer, the less likely they are to investigate further and potentially discover the TDL-4 malware on the machine.

Golovanov said, "TDL-4 doesn't delete itself following installation of other malware. At any time [it] can ... delete malware it has downloaded."



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Wow
By WalksTheWalk on 7/6/2011 5:39:54 PM , Rating: 2
EricMartello,

Everyone knows you have a monopoly on coding 100% optimized applications.

Too many lulz to count. Given your logic, why not code everything in ASM? The extra time spent is surely worth the performance improvement. Coding in C/C++ just bloats the process with all of their nasty runtime overhead. Why code in C# or Java when everyone knows it's total crap to begin with, right? (BTW - The questions are rhetorical.)


RE: Wow
By EricMartello on 7/6/2011 10:48:41 PM , Rating: 2
I don't claim to have a monopoly on optimized code; but I do respect it and the people who take the time to create it, and I myself strive to avoid the laziness and bloater mentalities that McCoders have unleashed on the computing world while working on my own programs.

The C language still maintains the best balance between higher-than-machine-code level readability without the substantial performance issues you get with managed languages. Neither C nor C++ require any type of "runtime" and are largely platform independent. Any overhead that they might have would be introduced by customizing the program to the host OS, and even then, you would still get better performance with C or C++ than C#.

While coding exclusively in ASM may seem like a good idea, it would not yield substantial gains over a well-coded C program. You can actually embed ASM code within C as needed to speed up certain functions and algorithms within your program - without having to make the entire program in ASM. Also, with advanced compiler optimizations, C/C++ programs can actually match ASM programs in terms of file size and speed.

The main benefits of ASM are not merely the fact that a well-written ASM program can potentially execute faster than a program created in a higher-level language, rather it is the ultra-fine control you get over the host system with ASM.

If you need more control than C or C++ can give you, there's ASM. If you just need to make a program that runs as fast as possible, there's C or C++.


"What would I do? I'd shut it down and give the money back to the shareholders." -- Michael Dell, after being asked what to do with Apple Computer in 1997














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki