Researchers at Trend Micro have uncovered a spam botnet using subtle tricks to increase resiliency while staying under the radar of spam fighters.
The botnet, which Trend Micro dubbed StealRat, uses a mix of compromised websites and machines as part of its operation.
“In this set up, the actual spam server is hiding behind three layers of unsuspecting victims: two compromised websites and an infected machine,” blogged Jessa De La Torre, threat response engineer at Trend Micro. “The infected machine acts as a liaison between the spam server and the compromised website. As there is no interaction between the spam and server, it will appear the email have originated from the infected machine. The spam mail itself does not spread the malware, so there is no visible link between the two as well. In essence, they have separated the core functions and minimized interactions among them to cut-off any threads that could link them to each other.”
A compromised website has the payload link and a spamming script, De La Torre explained. Typically, the payload is porn or an online pharmacy webpage. The spamming script is coded in PHP and waits for data from an infected machine, which connects to the malicious spam server to collect the spam data. The spam data includes the sender name, recipient address, backup mail server and email template.
“Another interesting behavior is that it uses the compromised website’s domain as its email service domain,” the researcher noted. “For instance, if xyz.com is hosting the spamming script, the email will appear to have come from [sender name]@xyz.com.”
“In a compromised system (infected machine), the malware component also exhibits some conspicuous traits,” De La Torre continued. “For instance, some variants attempt to cloak its network traffic by modifying the host name to google.com while receiving its instructions from its C&C server [command and control server]. If the C&C is example.com, instead of directly connecting to it, it queries for the domain’s mail server (eg. mx1.example.com) and connects there instead. The network traffic won’t show an established connection to either example.com or mx1.example.com, the hostname would appear to begoogle.com instead.”
During Trend Micro’s investigation, the company identified 85,000 unique IPs/domains that sent out spam emails in one month; discovered that each IP/domain contains an average of two spamming scripts; discovered that each infected machines sends at least 8,640 spam data to compromised websites per day; and are currently rotating around seven million email addresses to send spam to.
“While exploiting vulnerable websites to send out spam has already been exhausted by other botnets, StealRat stood out because it used simple yet subtle methods to improve the botnet’s resiliency,” the researcher blogged. “Its operators set very clear boundaries. They used compromised sites to send out spam. They also made use of compromised machines but only as mediators between the compromised sites and the spam server.”
“This allowed them to cover their tracks, as they left no clear evidence of a connection between the sites and their server. They also used legitimate mail servers and modified hosts to mask their traffic.”
“This operation certainly proves that cybercriminals are always out looking for ways to evade the security defenses,” De La Torre wrote.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
