Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/28/2013
11:40 PM
Gunter Ollmann
Gunter Ollmann
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

A Mercenary Approach To Botnets

When does a botnet become valuable to government intelligence agencies?

For a period of two years, if often felt that not a week went by without some security company or product vendor announcing the takedown of a multimillion-node botnet. I don't know if it was the waning enthusiasm of the media to cover "yet another botnet takedown," the public's exhaustion over a threat they could do little prevent, or the fact that the majority of botnet "takedowns" were merely temporary setbacks for their criminal overlords, but as we reach the end of 2013, the frequency of such boastings have declined noticeably.

While the public broadcasts of botnet takedowns are now more likely to be associated with a golden age in the battle against the bots, the war continues on a less visible plane. Regardless of whether this war can, in fact, be won, a question I'm increasingly being asked is whether certain organizations and government entities actually want to win it.

Why wouldn't the good guys want to win the botnet battle? Many salty dogs of the security industry have experienced how shutting down one attack vector forces the threat to evolve in another direction -- a direction that will likely be even more difficult to combat or, minimally, require substantial research effort to investigate. Eighty percent efficacy against a threat you understand is considerably better than 0 percent of a threat you have no technology in your back pocket for.

But that’s not the only reason why a growing pool of security professionals would sooner hold back from shutting down the botnets that plague the Internet. Botnets harvest a lot of data from their victims. Access to that data is increasingly lucrative and, if you package the data just right, can be sold on as a subscription feed to a growing pool of organizations.

The security analyst community used to be quite open in the way they shared information about botnets -- in particular, information about the command-and-control (C&C) servers, the domain names and IP addresses being used, samples of the bot malware, and copies of the C&C software. Now, because this information has a demonstrable value, those that have it are much less likely to "give back to the community." If anything, they're more likely to create new subscription services and provide it as a paid-for stream of data.

But what is this data, and who is it useful to?

When people first hear that botnet data is up for sale, I think most jump to the conclusion that the data is a stream of all of the personal and confidential information being stolen from the botnet victims. In some cases it may be, but most often it's not. More often than not, it may simply be a list of IP addresses of the victims under the control of a single piece of malware.

Depending on who you're selling to and what their missions are, even data as "uninteresting" as the IP addresses of the victims holds a unique and complementary value to some folks. For example, government agencies such as the CIA or NSA can use it to map which botnets are successfully penetrating computers within countries or institutions they're tracking. By knowing what the original malware was, the agency is going to know the operating system and major application version numbers of the infected devices. This adds to the pool of knowledge about an adversary, which could be leveraged in a time of need.

If an organization is smart, it'll also be sinkholing the C&C domains -- probably not all of them, just enough to provide visibility of the victims, but not crossing a threshold that forces the criminal who built the botnet to change tactics and stop growing the botnet.

If the botnet C&C software isn't particularly well-written (which is often the case), or if someone has reverse-engineered the C&C portal software and found interesting vulnerabilities, then simply knowing the domain names used by the botnet malware could allow an agency to access all the information being harvested by the bot on the victims computer (e.g., UIDs, passwords, applications installed, browser history, banking credentials, etc.), or even issue new commands.

It used to be that the worlds of bug hunters and malware analysts were separate and far between. In the past couple of years, the ability to analyze malware samples and identify exploitable vulnerabilities in them has become very important. Given that some botnets have a bigger pool of victims than many commercial software vendors have licensed customers, the value of an exploit that grants reliable remote control of a popular malware agent is rising in value. I'd hazard a guess that a remotely exploitable vulnerability in Zeus, SpyEye, or any of the other top10 botnet malware families is likely worth tens of thousands of dollars to most government agencies around the world.

In many ways, botnets have become a golden goose to those charged with gathering intelligence on the populations of foreign entities. The bulk of the victim's data is useful for mapping populations, communication profiles, and as egress points for counterintelligence exercises. Then, given how many botnet victims there are, the probability that a few "interesting" computers will have succumbed along the way is similarly high -- providing direct insight in to a pool of high value targets.

The incentives are high for many businesses and government agencies to not be too heavy-handed in combating the global botnet pandemic. There's money to be had and, with each passing day, more interesting ways are being uncovered in how to package the data, and how to employ it.

-- Gunter Ollmann, CTO, IOActive Inc.

 

Gunter Ollmann serves as CTO for security and helps drive the cross-pillar strategy for the cloud and AI security groups at Microsoft. He has over three decades of information security experience in an array of cyber security consulting and research roles. Before to joining ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15037
PUBLISHED: 2020-07-07
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.
CVE-2019-4323
PUBLISHED: 2020-07-07
"HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame."
CVE-2019-4324
PUBLISHED: 2020-07-07
"HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy."
CVE-2020-15036
PUBLISHED: 2020-07-07
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Linked.php dv parameter.
CVE-2020-15577
PUBLISHED: 2020-07-07
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Cameralyzer allows attackers to write files to the SD card. The Samsung ID is SVE-2020-16830 (July 2020).