IT Security

Disrupted botnet

by Mark Rowe

In a global operation coordinated by the international policing body INTERPOL‘s Global Complex for Innovation in Singapore, a group of IT companies including Kaspersky Lab, Microsoft, Trend Micro and Japan’s Cyber Defense Institute, with law enforcement agencies, have disrupted the Simda criminal botnet – a network of thousands of infected PCs around the world.

In a series of simultaneous actions on Thursday, April 9, ten command and control servers were seized in the Netherlands, and other servers taken down in the US, Russia, Luxembourg and Poland. The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.

This is expected to disrupt the botnet’s operation, the authorities say. It will increase the cost and risk for cybercriminals intent on continuing their illegal business and will prevent victims’ computers from participating in malicious schemes, they add.

· Simda is a “pay-per-install” malware used to distribute illicit software and different types of malware, including those capable of stealing financial credentials. The pay-per-install model allows cybercriminals to earn money by selling access to infected PCs to other criminals who then install additional programs on it.

· Simda is distributed by a number of infected websites redirecting to exploit kits. The attackers compromise legitimate web sites/servers so that the web pages served to visitors include malicious code. When users browse these pages, the malicious code silently loads content from the exploit site and infects a non-updated PC.

· The Simda botnet has been seen in more than 190 countries, with the US, UK, Russia, Canada and Turkey being the worst affected.

· The bot believed to have infected 770, 000 computers worldwide, with the vast majority of victims in the US (more than 90,000 new infections since the start of 2015).

· Active for years, Simda had been increasingly refined to exploit any vulnerability, with new, harder to detect versions being generated and distributed every few hours. At the moment, Kaspersky Lab’s virus collection contains more than 260,000 executable files belonging to different versions of Simda malware.

Police add that intelligence is now being gathered to identify the actors behind the Simda botnet; the people who applied to their criminal activities the business model of charging affiliate partners.

Sanjay Virmani, Director of the INTERPOL Digital Crime Centre, said: “This successful operation highlights the value of, and need for partnerships involving national and international law enforcement and private industry in the fight against the global threat of cybercrime. The operation has dealt a significant blow to the Simda botnet. INTERPOL will continue its work to assist member countries in protecting their citisens from cybercriminals and to identify other emerging threats.”

Vitaly Kamluk, Principal Security Researcher at Kaspersky Lab, is on secondment to INTERPOL. He said: “Botnets are geographically distributed networks and it is usually a challenging task to take down such a thing. That’s why the collaborative effort of both private and public sectors is crucial here – every party makes its own important contribution to the joint project. In this case, Kaspersky Lab’s role was to provide technical analysis of the bot, collect botnet telemetry from the Kaspersky Security Network and advise on takedown strategies.”

As a result of the disruption operation, command and control servers used by criminals to communicate with infected machines have been shut down. However it’s important to note that some infections are still in place. To help victims to disinfect their PCs, Kaspersky Lab has created a CheckIP website. Here, users can find out if their IPs have been spotted on Simda command and control servers, signifying the possibility of active or past infection. These IP addresses became available as a result of the server takedown operation.

If a user’s IP is recognised, it doesn’t necessarily mean that the system is infected – in some cases one IP address might be used by several PCs on the same network (for example, they could be connected to one Internet service provider).

To check if your system is a part of a Simda botnet go to https://checkip.kaspersky.com

And to learn more about Simda botnet disruption go to Securelist.com.

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing