Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Security Firm Analyzes Success of Botnet Takedowns

Israel-based threat detection firm Seculert has been monitoring the effects of the recent Gameover Zeus and Shylock botnet takedown operations, and found that the cybercriminals have already taken steps to resurrect their campaigns.

Israel-based threat detection firm Seculert has been monitoring the effects of the recent Gameover Zeus and Shylock botnet takedown operations, and found that the cybercriminals have already taken steps to resurrect their campaigns.

The international operation against Gameover Zeus, which also disrupted the CryptoLocker ransomware, was announced on June 2 by the law enforcement agencies and private sector companies that contributed to the takedown. On July 11, the United States Department of Justice provided an update saying that the “technical and legal measures undertaken to disrupt Gameover Zeus and Cryptolocker have proven successful.”

Do Botnet Takedowns Work?However, at around the same time, Bitdefender reported that while CryptoLocker had not been active, its infrastructure was still being used by other threats. Furthermore, researchers from Malcovery Security identified a new Trojan largely based on Gameover Zeus that appeared to be part of cybercriminals’ efforts to resurrect the botnet.

Seculert has been monitoring the evolution of the Gameover Zeus botnet and confirms there is a new variant which doesn’t rely on a peer-to-peer (P2P) mechanism, like previous versions did. Furthermore, the new variant has a different domain generation algorithm (DGA) which is now generating 1,000 domains per day, unlike the previous variant which generated only 1,000 new domains per week.

Before the takedown, roughly 25,000 to 100,000 bots communicated with the security firm’s sinkhole every day. After the operation, the number has dropped significantly, but there have been signs of a comeback.

“In the last few days we have seen a surge in the number of bots communicating with our sinkhole; reaching as high as almost 10,000 infected devices. We anticipate the communications traffic to level out over time to reflect pre-takedown amounts,” Seculert CTO Aviv Raff explained in a blog post.

On July 10, several law enforcement agencies and cyber security companies announced seizing command and control servers and domains used by Shylock, a piece of financial malware that’s said to have infected at least 30,000 computers worldwide.

Seculert managed to sinkhole Shylock three days after the takedown operation was announced, and found that approximately 10,000 bots have been trying to communicate with the server every day.

Advertisement. Scroll to continue reading.

Shylock and Gameover Zeus would not be the only botnets to make a comeback after a takedown operation. The Kelihos/Waledac botnet was disrupted twice in 2011 and 2012, yet the cybercriminals managed to resume their activities each time. One day after the second takedown, which took place in March 2012, Seculert identified over 70,000 devices still active in the botnet.

Seculert claims it’s not trying to question the success of these operations, but to identify the factors that determine their success. Since many of the campaigns against botnets only cripple the malware instead of completely killing it off, it’s possible that these efforts are only testing the limits of cybercriminals, Raff said.

“It is worth considering whether takedowns are a win for the team of cyber good guys or just a timeout allowing the criminals to regroup and come back stronger,” the expert noted.

 

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.