Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Ponmocup Botnet Still Actively Used for Financial Gain

Fox-IT, the security firm recently acquired by NCC Group for $142 million, has published a report on Ponmocup, a sophisticated botnet that has been used over the past years by cybercriminals for financial gain.

Fox-IT, the security firm recently acquired by NCC Group for $142 million, has published a report on Ponmocup, a sophisticated botnet that has been used over the past years by cybercriminals for financial gain.

The malware powering the botnet has been around since 2006 and it’s known under various names, including Ponmocup, Vundo, Virtumonde, Milicenso and Swisyn. The malware has been used for ad fraud, data theft and downloading additional threats to infected systems.

Fox-IT believes the threat has infected more than 15 million unique devices since 2009 and experts estimate that the number of active infections is currently at 500,000. In May 2011, Abuse.ch reported sinkholing Ponmocup and observing 1.2 million unique infections within 24 hours. The number of infections peaked the next month at 2.4 million.

Ponmocup is currently one of the largest and longest-running botnets, but it hasn’t been in the news lately because its operators do their best to keep it under the radar. The malware made a lot of headlines in 2012 when it caused printers connected to infected machines to print garbled data.

The Ponmocup malware framework consists of different components used to deliver, install, execute and control the malware. Each of these components is designed to prevent researchers from reverse engineering it and analyzing its functionalities.

The threat uses encryption and stores its components in different locations in an effort to evade detection by traditional security products. It also relies on different domains for installation, which prevents security teams from using the domains as indicators of compromise (IoC). Ponmocup can also steal FTP and Facebook credentials, which might be used by the attackers to further spread the malware and increase the size of the botnet.

Cybercriminals have also invested a lot of time and effort into setting up the infrastructure used to control the Ponmocup botnet. Different servers are used for each of the components and communications between the malware and the backend servers go through several proxy layers, which makes it difficult to disrupt the entire botnet.

“Based on the size of the command and control infrastructure, it is thought that the infrastructure is maintained, monitored and protected by a well-organized group of operators. This is amongst others based on the domains in use, number of proxies in use, estimated number of back-end systems, used delivery methods and limited affiliate schemes,” Fox-IT said in its report. “It was also observed that in certain cases, the operators reacted quickly to events which could impact the botnet’s infrastructure, suggesting that the operators closely monitor their back-end infrastructure.”

The security firm believes Ponmocup operators are most likely Russian, or at least Russian speakers. This is based on the fact that the malware was initially designed to avoid infecting devices in Russia, Ukraine and Belarus, and the instructions sent by the operators to partners and affiliates are written in Russian.

Advertisement. Scroll to continue reading.

Experts say it’s difficult to determine how much money cybercriminals made with the Ponmocup botnet, but they estimate that it’s a multi-million dollar business considering the level of sophistication of the malware and infrastructure.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.