A giant botnet behind one million malware attacks a month just got shut down

Image: iStock
A major botnet operation incorporating millions of PCs and associated with over 80 different malware families has been taken down in an international cyber operation.
Authorities including the FBI, Europol’s European Cybercrime centre (EC3), the Joint Cybercrime Action Task Force, the Luneburg Central Criminal Investigation Inspectorate in Germany and the European Union’s Eurojust agency worked with private partners including Microsoft and ESET in order to dismantle the Andromeda botnet.
Also known as Gamarue, the Andromeda malware family was created in September 2011 with the purpose of stealing credentials and downloading and installing additional malware onto infected systems.
A crime-kit sold on the dark web, Gamarue offer high levels of customisation, allowing the user to build and deploy custom plugins – notable examples of malicious activity distributed using the self-service kit include building plugins to steal content entered into web forms while another allows attackers to control compromised systems.
The malware grew to be so prolific that it’s responsible for infecting over one million systems around the world every month, with Gamarue distributed in all manner of ways, including through social media, instant messaging, spam emails, exploit kits and more.
Such is the popularity of of Gamarue, the avalanche botnet spun off into 464 distinct botnets across 1,214 domains and IP addresses acting as the command and control servers.
But on 29 November 2017, the botnet was dismantled in a joint operation by law enforcement agencies and cyber security companies.
See also: Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse
The servers running the malicious network were identified by ESET researchers who built a bot to communicate with the Gamarue command and control server. Using this, ESET and Microsoft were able to track and identity the C&C servers over the course of 18 months. The information was then used to carry out the takedown of all the domains used by cybercriminals as C&C servers.
保密法宣传课
German law enforcement worked with the FBI and European authorities on investigations into the botnet, ultimately cumulating in its dismantling at the end of November and the arrest of a suspect in Belarus.
“This is another example of international law enforcement working together with industry partners to tackle the most significant cyber criminals and the dedicated infrastructure they use to distribute malware on a global scale,” said Steven Wilson, the Head of Europol’s European Cybercrime Centre.
“The clear message is that public-private partnerships can impact these criminals and make the internet safer for all of us”.
A sink-holing operation has been deployed against over a thousand domains by the malicious software, resulting in two million Andromeda victim IP addresses from 223 countries being identified.
The sink-holding measures have been extended for at least another year, as authorities say 55 percent of systems infected by Avalanche are still infected today.
Andromeda was also used as part of the Avalanche network, which was dismantled almost exactly one year ago in an international operation.
READ MORE ON CYBER CRIMEThe most common malware, country by countryUS targets Kelihos botnet after Russian’s arrest in Spain [CNET]Botnets: Inside the race to stop the most powerful weapon on the internetNo more ransomware: How one website is stopping the crypto-locking crooks in their tracks How a consortium of security professionals took down the WireX Android botnet [TechRepublic]
Related Topics:

要采取措施维护网络安全与信息安全,要加强用户的信息安全防范意识和技能,培养网民的网络道德和礼仪,让网民对自己的网络行为负责,才是关键。
Security TV
Data Management
调查称超过51%的受访者遇到过恶意插件和病毒攻击,并有所损失;仅有15%的受访者定期接受信息安全培训。

猜您喜欢

厚本金融受邀参加2017金融风险管理高端论坛
员工安全期刊在安全管理中的价值
网络安全法视频宣传片 第二集 国家网络安全的现状与重要性概述
反抽结束调整将延续至1月 创业板将破1641点
YOUNGONTOP DATA-DESTRUCTION
如何从手机电子钱包中偷钱