FBI, Europol, Microsoft, ESET Team Up, Dismantle One of World’s Largest Malware Operations

FBI, Europol, Microsoft, ESET Team Up, Dismantle One of World’s Largest Malware OperationsAvalanche, aka Gamarue, aka Wauchos, malware enterprise spanned hundreds of botnets and 88 different malware families.A pervasive and long-running malware operation that used more than 460 different botnets and infected more than 1.1 million computers a month has been derailed in a yearlong operation by global law enforcement and cybersecurity vendors.
The FBI, Europol’s European Cybercrime Center, Joint Cybercrime Action Task Force (J-CAT), Eurojust, and Germany’s Luneburg Central Criminal Investigation Inspectorate, along with Microsoft and ESET, on November 29 officially took down the so-called Andromeda network of botnets that spread Gamarue aka Wauchos malware. One of the largest malware operations in the world, it spread the malware via multiple botnets.
网络安全法网络宣传片 002 国家网络安全的现状与重要性概述
Gamarue is sold in the Dark Web under the moniker of Andromeda bot, a Trojan downloader crimeware kit that’s at least six years old and is mainly a tool for spreading additional malware. The law enforcement operation disarmed some 1,500 domains and IP addresses used for botnet command-and-control servers, 464 different botnets, and 80 related malware families. Among the malware Andromeda/Gamarue spread were the prolific Petya and Cerber ransomware, the Neutrino bot for DDoS attacks, Lethic spam bot malware, and information-stealers Ursnif, Carberp, and Fareit.
Some 2 million victim IP addresses from 223 countries were intercepted by the takedown operation’s sinkholes in a 48-hour period, according to Microsoft’s data.
The law enforcement operation also resulted in the arrest of an individual in Belarus. Law enforcement authorities did not provide details on the suspect, nor the nature of his or her involvement in the Andromeda cybercrime enterprise.
But the catch is that with any botnet infrastructure disruption by law enforcement or other groups, the cybercrime operation may well reappear in another form in the future since many perpetrators are beyond the scope of law enforcement.
“As this was sold as a kit in underground forums, there is always a possibility that someone will start a new botnet using the same malware. However, through this operation, all known Andromeda botnets have been disrupted and the police made at least one arrest so far,” says Jean-Ian Boutin, senior malware researcher with ESET. “From that perspective, the operation was a success whatever happens next.”
Andromeda is one of the more vast botnet and malware syndicates. “Andromeda is widespread, responsible for infecting millions of systems, affects all countries and has been around since 2011. There are not a lot of malware families that tick all these boxes,” Boutin says.
Europol’s European Cybercrime Centre director Steven Wilson, said the Andromeda takedown demonstrates how law enforcement and private industry can work together to fight cybercrime.  “This is another example of international law enforcement working together with industry partners to tackle the most significant cyber criminals and the dedicated infrastructure they use to distribute malware on a global scale. The clear message is that public-private partnerships can impact these criminals and make the internet safer for all of us,” Wilson said in a statement.
Andromeda/Gamarue/Wauchos steals credentials and drops additional malware onto a victim’s computer. The malware is customizable, allowing cybercriminals to build custom plug-ins such as keyloggers, which sell for $150, and rootkits, which are included in the crimeware kit.
According to ESET researchers, the malware is distributed via social media, instant messaging, USBs, spam, and exploit kits.
Interestingly, the malware detects keyboard-language settings, and if they are either for Belarus, Russia, Ukraine, or Kazakhstan, the malware won’t continue to compromise the machine. It also employs antivirus evasion methods to bypass the security software, and it avoids virtual machines and sandboxes to evade analysis.
“Gamarue attempts to tamper with the operating systems of infected computers by disabling Firewall, Windows Update, and User Account Control functions. These functionalities cannot be re-enabled until the Gamarue infection has been removed from the infected machine,” Microsoft said in a blog post today about the malware. But Windows 10 is immune from the OS-tampering, Microsoft said.
India and Indonesia were the nations hit hardest by Gamarue malware, according to Microsoft’s data:
这些日子不少安全公司都暴出安全问题,着实很让客户担忧,听说医生都看不好自己的病,看来安全公司要加强自身的安全检查,最好请外援帮忙。
Source: Microsoft
Other organizations who assisted in the disruption of Andromeda were the Shadowserver Foundation, Registrar of Last Resort, Internet Corporation for Assigned Names and Numbers (ICANN) and associated domain registries, Fraunhofer Institute for Communication, Information Processing and Ergonomics, and the German Federal Office for Information Security.

Avalanche Connection
According to Europol, Andromeda’s demise in part was informed by a previous botnet takedown in November of 2016 when the US Department of Justice, FBI, Europol, and others, shut down the infamous Avalanche botnet and criminal enterprise that was used to wage cyberattacks including ones using Andromeda. The Avalanche operation was the largest-ever sinkhole operation.
Avalanche had been in operation since 2010, and included the botnet, money-mule laundering operations, and the ability to provide fast-flux communications for other botnets. It hosted some 800,000 malicious domains and distributed Trojans and ransomware, for example.
“We’re not talking about some kid in his mom’s basement … we’re talking about businessmen. This is a business to them,” Tom Grasso, unit chief of the FBI’s cyber division, said in a presentation at Black Hat USA in Las Vegas in July. “This was a strategic move by the criminals running this to add another level of complexity to make it unsusceptible to law enforcement intervention.”
Related Content:
8 Low or No-Cost Sources of Threat Intelligence
Cerber Fights Anti-Ransomware Tools
Avalanche Botnet Comes Tumbling Down In Largest-Ever Sinkholing Operation
公司应该制定有效的信息系统变更管理流程,控制系统变更过程,分析变更影响,确保生产环境的完整性和可靠性。包括紧急变更在内的所有变更都应记入日志,并做好系统变更前准备。

猜您喜欢

移动办公用户必须了解的加密基础
专利保护与信息安全故事案例
网络安全法培训短片
哈尔滨一公交站近千平米只有一路车 https://news.qq.com/a/20171204/005344.htm#p=1
DARKPATTERNS MYCOUNTRYMATCH
组织应该教育员工小心防范身份窃贼