Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

International Operation Disrupts Dorkbot Botnet

Law Enforcement and Tech Organizations Team Up To Disrupt Dorkbot Botnet

Law Enforcement and Tech Organizations Team Up To Disrupt Dorkbot Botnet

Global law enforcement agencies in partnership with Microsoft, ESET and CERT Polska, have managed to disrupt the Dorkbot botnet, one of the most widely distributed malware families, also known as Nrgbot.

The malware is estimated to have infected over a million computers in 190 countries by spreading through multiple channels, including USB flash drives, instant messaging programs, social network sites, exploit kits, and spam emails. As soon the malware infects a machine, it steals user’s personal information and credentials, disables security protection, and distributes other forms of malware.

The Internet Relay Chat (ICR) based malware steals passwords for popular services, including Facebook and Twitter, connects to an IRC server to receive further commands, and has been found to install code from malware families such as Win32/Kasidet, aka Neutrino bot, which is used to launch DDoS attacks, and Win32/Lethic, a well-known spam bot.

On infected systems, Dorkbot searches for removable media to replicate itself, and places two types of files on them, namely a dropper and .LNK files with enticing names that point to it. The dropper (Win32/Dorkbot.I) contacts a hardcoded C&C server to download a file that will decrypt and execute a wrapper (Win32/Dorkbot.L) used to install the main malware component.

It launches the main Dorkbot IRC component (Win32/Dorkbot.B) and hooks into the DnsQuery API, as the main component does not contain the true C&C domains. Both the IRC and the wrapper try to resolve domains, which makes it difficult to obtain the real C&C addresses, the security firm notes. However, as soon as the installation is completed, the system connects to the IRC server and waits for commands.

Although it has been around for several years, as a 2012 VirusBulletin paper shows, Dorkbot is still prevalent, ESET notes in a blog post, explaining that fresh samples are detected every day from all around the world. The malware features a modular design and has managed to reinvent itself through the years, researchers at Zscaler explained earlier this year.

According to Microsoft, its security tools have detected Dorkbot on an average of 100,000 infected machines per month for the past six months. The company also notes that the Microsoft Malware Protection Center (MMPC) has been monitoring the malware since April 2011, and users in 10 countries have been impacted the most in the past six months, accounting for 61 percent of the total infections.

Advertisement. Scroll to continue reading.

Many security products can already detect and block Dorkbot, and users are advised to keep their antivirus programs updated at all times to ensure they are protected. Additionally, users should be cautious when opening emails or social media messages from unknown users and when downloading software from third-party websites.

Users suspecting that they might have been infected can run Microsoft’s Malicious Software Removal Tool (MSRT) to check their system for Dorkbot and other malware. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.