Are takedowns an exercise in futility?

2010-04-01

Mary Landesman

ScanSafe, USA
Editor: Helen Martin

Abstract

‘There is often little incentive for domain registrars or hosting providers to make it more difficult for criminals to obtain services.’ Mary Landesman, ScanSafe


The first quarter of 2010 witnessed multiple takedown efforts aimed at the Lethic, Waledac, Mariposa and Zeus botnets. Lethic, which specialized in spam for counterfeit goods, pharmaceuticals and degree-less diplomas, was shut down by Neustar in January. In February, Microsoft obtained a court order allowing Verisign and other registrars to withdraw the domains used by the Waledac botnet.

But these takedowns appear to have had little or no effect on spam levels, with statistics from Arbor Networks, Trend Micro, Commtouch and MessageLabs all indicating either steady or increasing spam levels month over month in the first quarter. For example, MessageLabs reported spam levels of 89.4% in February – a 5.5% increase on January totals – and 90.7% in March, a 1.4% increase on February totals.

The effects of the Mariposa and Zeus takedowns were equally disappointing. Within days of announcing the arrest of Mariposa’s bot herders, Panda Labs (which assisted in the botnet’s takedown) reported on new Mariposa activity from a different set of attackers.

Likewise, efforts aimed at de-peering the Troyak-AS ISP, which provides service to a segment of the Zeus command and control (C&C) servers, proved to be a virtual game of whack-a-mole. Less than 24 hours after being de-peered by its latest upstream provider, Troyak-AS resumed service under a new upstream provider, and this pattern was repeated numerous times.

These less than dramatic results beg the (multi)-million-dollar question: are such takedown efforts an exercise in futility?

Certainly if one focuses only on short-term statistics, the answer would appear to be ‘yes’. However, if one focuses on some of the precedents set during the first quarter, tangible long-term impact may become a reality.

In the case of Lethic, Waledac and Zeus the takedown efforts engaged the service providers, hosts and domain registrars. This not only sets an important legal precedent facilitating future takedown efforts, but also shifts the responsibility – and some of the costs – onto those who (unknowingly or otherwise) enable criminal activity.

Consider the situation with Troyak-AS and the Zeus C&C serviced by that provider. An analysis of ScanSafe traffic involving the domains and IP addresses listed in ZeusTracker reveals that the traffic serviced by Troyak-AS in the first quarter of 2010 made up 48.5% of all Zeus traffic. Thus, a successful shutdown of that segment could lead to significant disruption and financial losses for Zeus bot herders.

Perhaps most importantly, though, Troyak-AS also suffers a financial loss. It is presumed that costs were incurred each time Troyak-AS moved to a new upstream provider. Assuming the ISP serviced legitimate businesses as well as Zeus, it is also quite possible that it suffered a loss of customers due to its inability to maintain service. The combination of increased costs and customer loss could cause such a service provider to re-evaluate their business model.

Currently, there can be a considerable financial incentive for so-called bulletproof hosts to turn a blind eye to malicious activity occurring through their services. And there is often little incentive for domain registrars or hosting providers to make it more difficult for criminals to obtain services. But if efforts continue to engage these providers – and where necessary hold them accountable – at some point the cost of turning a blind eye may become unpalatable.

The punches delivered in the first quarter may not have resulted in a technical knockout, but at the very least we’ve winded the bot herders and set a precedent for the enablers. Long-term success depends on continued concerted takedown efforts that engage the providers and cause the enabling of criminal activities to become a cost centre rather than a profit centre. We should support – and not criticize – these types of takedown efforts because we are all reaching for the same goal: better security for all.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.