A giant botnet behind one million malware attacks a month just got shut down

Image: iStock
A major botnet operation incorporating millions of PCs and associated with over 80 different malware families has been taken down in an international cyber operation.
Authorities including the FBI, Europol’s European Cybercrime centre (EC3), the Joint Cybercrime Action Task Force, the Luneburg Central Criminal Investigation Inspectorate in Germany and the European Union’s Eurojust agency worked with private partners including Microsoft and ESET in order to dismantle the Andromeda botnet.
LMS学习管理系统管理员快速操作指南
Also known as Gamarue, the Andromeda malware family was created in September 2011 with the purpose of stealing credentials and downloading and installing additional malware onto infected systems.
A crime-kit sold on the dark web, Gamarue offer high levels of customisation, allowing the user to build and deploy custom plugins – notable examples of malicious activity distributed using the self-service kit include building plugins to steal content entered into web forms while another allows attackers to control compromised systems.
The malware grew to be so prolific that it’s responsible for infecting over one million systems around the world every month, with Gamarue distributed in all manner of ways, including through social media, instant messaging, spam emails, exploit kits and more.
Such is the popularity of of Gamarue, the avalanche botnet spun off into 464 distinct botnets across 1,214 domains and IP addresses acting as the command and control servers.
But on 29 November 2017, the botnet was dismantled in a joint operation by law enforcement agencies and cyber security companies.
专肆破坏的黑客、无聊的脚本小孩、商业间谍和白领犯罪最不想让人们看到信息安全启蒙教育视频。
See also: Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse
The servers running the malicious network were identified by ESET researchers who built a bot to communicate with the Gamarue command and control server. Using this, ESET and Microsoft were able to track and identity the C&C servers over the course of 18 months. The information was then used to carry out the takedown of all the domains used by cybercriminals as C&C servers.
German law enforcement worked with the FBI and European authorities on investigations into the botnet, ultimately cumulating in its dismantling at the end of November and the arrest of a suspect in Belarus.
“This is another example of international law enforcement working together with industry partners to tackle the most significant cyber criminals and the dedicated infrastructure they use to distribute malware on a global scale,” said Steven Wilson, the Head of Europol’s European Cybercrime Centre.
“The clear message is that public-private partnerships can impact these criminals and make the internet safer for all of us”.
A sink-holing operation has been deployed against over a thousand domains by the malicious software, resulting in two million Andromeda victim IP addresses from 223 countries being identified.
The sink-holding measures have been extended for at least another year, as authorities say 55 percent of systems infected by Avalanche are still infected today.
Andromeda was also used as part of the Avalanche network, which was dismantled almost exactly one year ago in an international operation.
READ MORE ON CYBER CRIMEThe most common malware, country by countryUS targets Kelihos botnet after Russian’s arrest in Spain [CNET]Botnets: Inside the race to stop the most powerful weapon on the internetNo more ransomware: How one website is stopping the crypto-locking crooks in their tracks How a consortium of security professionals took down the WireX Android botnet [TechRepublic]
Related Topics:
Security TV

Data Management
如何才能获得业界经验丰富的信息安全专家团队的鼎力支持呢,查看谁能帮您发掘需求、策划、创作和交付整体培训方案。

猜您喜欢

中富通与安司源战略合作 探索军用信息安全技术民用化
金融保险行业信息安全意识视频培训
网络安全法宣传片 002 国家网络安全的现状与重要性概述
DCE一周市场观察20171117
LINUXSEVER HUNT4YOURFIR
新年新风尚新方式培训新员工新安全观