Microsoft Says Any Botnet Can be Decapitated, Destroyed
July 10, 2011 2:20 PM
comment(s) - last by
Microsoft blasted recent claims that the new TDL-4 botnet was indestructible. No botnet is impervious to decapitating C&C takedowns and a concerted attack, it states.
(Source: Google Images)
Company points to takedown of "indestructible" Rustock, Waledac as case studies in how to kill a tough botnet
Today, networks of malware infected computers called "botnets" are controlled by malicious masters to spread spam and orchestrate takedown attacks across the internet. The botnets are growing very, very well crafted, leading some to suggest that they may be "indestructible".
In response to one such claim by Dell Inc. (
) SecureWorks research Joe Stewart, who said that the
TDL-4 botnet was "pretty much indestructible"
, the senior attorney with Microsoft Corp.'s (
) Digital Crime Unit argued that claim is false and that any botnet is destructible.
Richard Boscovich comments in
, "If someone says that a botnet is indestructible, they are not being very creative legally or technically. To say that it can't be done underestimates the ability of the good guys. People seem to be saying that the bad guys are smarter, better. But the answer to that is 'no.'"
TDL-4 will certainly be a tough. The malware has infected 4.5 million PCs thus far, and embeds a rootkit deep in the hard drive, in the master boot record. The malware removes other pieces of malware found on the machine to avoid detection. And it uses peer-to-peer connections to update its list of command and control (C&C) servers, safeguarding the botnet from takedown of C&C servers.
However, Microsoft takes major issue with the idea that TDL-4 is indestructible. After all, Microsoft already killed a botnet called "Waledac" that used similar peer-to-peer updates. Waledac, known for sending up to 1.5 billion pieces of spam daily, was decapitated in February 2010 when a court order allowed Microsoft to cut off
276 domains associated with the botnet
Microsoft also used additional undisclosed measures (perhaps denial of service attacks) to make sure the peer-to-peer network was fully dead and unable to update the C&C information.
In March, with help from Microsoft, federal agents raided a hosting company, seizing servers responsible for the Rustock botnet. With the botnet brains decapitated, the botnet effectively died, taking half of spam in the U.S. with it. And in April Microsoft and federal authorities successfully
killed the 10-year-old "Coreflood" botnet
via a similar C&C decapitation approach.
Mr. Boscovich comments, "[Waledac] was a proof of concept that showed we are able to poison the peer-to-peer table of a botnet. Each takedown is different, each one is complicated in its own way. Each one is going to be different, but that doesn't mean that there cannot be a way to do this with any botnet."
Symantec security researcher Sergey Golovanod says the botnet is "practically indestructible." He remarks, "[TDL-4 is] the most sophisticated threat today."
However, even Dell backed off somewhat from their initial remarks, with a SecureWorks spokesperson saying this week, "Since mid-March 2011, Dell SecureWorks' CTU [Counter Threat Unit] research team has seen a significant decline in the number of attempted Rustock attacks, and we do attribute it to the comprehensive efforts of Microsoft."
Indeed Alex Lanstein, a senior engineer with FireEye, a security organization who worked with Microsoft on the takedowns says cooperation between Microsoft, other companies, and U.S. law enforcement agencies has proved integral to creating combined assaults capable of bringing down tough botnets. He states, "It's the trust relationships Microsoft has created and I think [the technique] speaks to any malware infrastructure where some kind of data feed exists. It really, really works. With the Rustock takedown, Microsoft has built the framework for others to do the same. This is definitely not the last botnet we're going to go after."
So, TDL-4 may be tough -- but "indestructible"? Not so much.
This article is over a month old, voting and posting comments is disabled
RE: botnets lol
7/11/2011 8:14:32 AM
Rootkiting botnets move through networks like real human viruses. The trick is to find a vulunrability that can be exploited, exploit the crap out of it with your new code until someone notices and fixes it or creats defenses against it to get enough systems infected to make it worth the time you spent creating the botnet.
The reason there are fewer Linux/OSX botnets has little to do with system security and everything to do with economics. Basically there are too many variations and too few systems using Linux/OSX around to make an attack that will work long enough to make a worthwhile botnet. You live in the 5% and below saftey net similar to typical real vaccination programs so long as 95+% of the population is "immune" via vaccination the remaining population that cannot be vaccinated is "fairly" safe from infection because the herd protects you. In this case your popultation is so sparse and diverse passing the infection on becomes difficult and thus not worth the time.
As to iOS/Android/WP7 time will tell, the way data is metered on cell phones makes it easier to spot unusual activity. I doubt attacks will move beyond annoyance type attacks and data theft type attacks there.
"I mean, if you wanna break down someone's door, why don't you start with AT&T, for God sakes? They make your amazing phone unusable as a phone!" -- Jon Stewart on Apple and the iPhone
TDL-4 Botnet is Close to Indestructible Say Researchers
June 30, 2011, 11:26 AM
Ten-Year-Old, 2 Million PC Botnet Finally Killed; Stole up to $100M USD
April 14, 2011, 11:21 AM
Microsoft Granted Permanent Ownership of 276 Botnet Domains
September 9, 2010, 9:29 AM
Netflix Announces 7-to-1 Stock Split, Eyes Explosive Overseas Growth
June 23, 2015, 8:18 PM
Sources: Hack on Fed. Database Lost 4.1M Social Security Numbers, Personal Info
June 11, 2015, 9:11 PM
The Big One: Chinese Hackers Steal Records of 4 Million U.S. Gov. Employees
June 4, 2015, 8:13 PM
Tutorial: Here's How to Force YouTube or Vimeo VIdeos to Embed as HTML5
June 3, 2015, 10:14 PM
Google Finally Fixes Maps Bug That Was Giving Racist, Profane Results
May 21, 2015, 1:43 PM
The Pirate Bay Loses Its Iconic Swedish Dot SE Domains
May 20, 2015, 6:31 PM
Most Popular Articles
F-16 Schools Trillion-Dollar F-35 in Mock Combat, Fleeing is Best Option Pilot Admits
July 1, 2015, 5:53 PM
SpaceX Falcon 9's Seventh Supply Mission to ISS Ends w/ Fiery Stage 1 Explosion
June 28, 2015, 1:10 PM
SanDisk's 200GB microSDXC Card Turns Smartphones Into Enviable PMPs
June 26, 2015, 2:02 PM
Windows XP, Vista Users Can Get Free Windows 10 Upgrade Thanks to Loophole
June 23, 2015, 2:23 PM
Apple Music: The Money, The Launch Hiccups, and the Nitty Gritty Details
June 30, 2015, 5:09 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2015 DailyTech LLC. -
Terms, Conditions & Privacy Information