Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Researchers Discover Botnet Powered by TOR

Researchers from Rapid7 and the Shadowserver Foundation discovered something unique last week. While browsing files on USENET, they discovered a botnet that has thousands of endpoints, and was able to operate without detection for months. To make matters worse, the botmaster took to Reddit earlier this year in order to brag about it.

Researchers from Rapid7 and the Shadowserver Foundation discovered something unique last week. While browsing files on USENET, they discovered a botnet that has thousands of endpoints, and was able to operate without detection for months. To make matters worse, the botmaster took to Reddit earlier this year in order to brag about it.

MalwareThe botnet’s name is Skynet, taken from the Sci-Fi classic. The base of the code is a modified variant of Zeus, enabling its botmaster with the ability to launch DDoS attacks (simply for laughs), mine Bitcoins (for daily earnings), and banking abilities. The banking abilities supplement the earnings from Bitcoins, as the data taken from the infected hosts are sold. For the curious, the information about Skynet is so complete due to its author, who took to Reddit in order to explain the process.

The botmaster has a nearly foolproof system running. He uses the legit TOR software, which bypasses most AV checks; he uses the TOR Hidden Service protocol for bot communication, which keeps him undetected, and a majority of his infected hosts were willing victims.

“Usenet is a distributed discussion platform established around 1980 and still very popular worldwide. Despite its original intent of simply being a plain text discussion forum (much like bulletin boards), over the years it has become a widely adopted platform for distributing pirated content such as movies and games, which are generally uploaded as RAR archives then split into chunks to circumvent the size limitations of Usenet’s protocol,”  Rapid7’s Claudio Guarnieri explained in a blog post.

Given that the botmaster, who is an unknown male suspected to reside in Germany, targets new releases on USENET alone, he has a stable victim base that’s willing to execute the malware themselves. He uploads a hijacked versions of the latest warez (pirated software) release, and people download and run it.

“Americans are the majority of the victims, about 30%, I really don’t know why, I never targeted them…About 20% of the users have good graphic cards, but are not sophisticated enough to install drivers, so my [Bitcoin] miner can’t run…80% have an antivirus installed, 5% have a rogue antivirus as system antivirus listed. So they seem to be prone victims. There are also 3 windows SERVERS, I really don’t know how my malware ended up there,” the botmaster explained.

His remarks are seven months old now, and Rapid7 speculates that the botnet has grown to an average of 12-15,000 compromised hosts. Frightening, considering that Skynet started as a challenge to circumvent anti-Virus protections.

The botnet is still active, and it’s unclear if there is any viable way to dismantle it. Despite the fact that it isn’t sophisticated – it’s a variant of the Zeus source code that was leaked to the web – it serves as proof that with TOR it is possible “to build an almost cost-free bulletproof botnet,” Guarnieri notes.

“Despite not being particularly sophisticated it represents a nice example of a simple but still effective botnet with a large portfolio of capabilities. The most important factor is certainly the adoption of Tor as the main communication channel and the use of Hidden Services for protecting the backend infrastructure. While it’s surprising that not more botnets adopt the same design, we can likely expect more to follow the lead in the future.”

Advertisement. Scroll to continue reading.

One of the interesting aspects to using TOR as a communication channel for a botnet is that it seems to limit size. Yet, if you consider the fact that Skynet turns each infected host into a TOR node on its own, then the size restriction is somewhat lifted. However, speed is still an issue traffic-wise, so it’s unlikely that massive bots will use the option – for now.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.