Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Botnet IT

Massive Botnet "Indestructible," Say Researchers 583

CWmike writes "A new and improved botnet that has infected more than four million PCs is 'practically indestructible,' security researchers say. TDL-4, the name for both the bot Trojan that infects machines and the ensuing collection of compromised computers, is 'the most sophisticated threat today,' said Kaspersky Labs researcher Sergey Golovanov in a detailed analysis on Monday. Others agree. 'I wouldn't say it's perfectly indestructible, but it is pretty much indestructible,' Joe Stewart, director of malware research at Dell SecureWorks and an internationally-known botnet expert, told Computerworld on Wednesday. 'It does a very good job of maintaining itself.' Because TDL-4 installs its rootkit on the MBR, it is invisible to both the operating system and more, importantly, security software designed to sniff out malicious code. But that's not TDL-4's secret weapon. What makes the botnet indestructible is the combination of its advanced encryption and the use of a public peer-to-peer (P2P) network for the instructions issued to the malware by command-and-control (C&C) servers. 'The way peer-to-peer is used for TDL-4 will make it extremely hard to take down this botnet,' said Roel Schouwenberg, senior malware researcher at Kaspersky. 'The TDL guys are doing their utmost not to become the next gang to lose their botnet.'"
This discussion has been archived. No new comments can be posted.

Massive Botnet "Indestructible," Say Researchers

Comments Filter:
  • Take 'em offline (Score:3, Insightful)

    by jnpcl ( 1929302 ) on Wednesday June 29, 2011 @08:21PM (#36617644)

    Yeah, it'll piss off every Grandma and Grandpa with an infected computer, but really.. the best way to deal with these massive botnets is to have the ISPs disable those accounts and contact the owners.

  • by Shikaku ( 1129753 ) on Wednesday June 29, 2011 @08:26PM (#36617688)

    From TFS:

    What makes the botnet indestructible is the combination of its advanced encryption and the use of a public peer-to-peer (P2P) network for the instructions issued to the malware by command-and-control (C&C) servers.

    So what's the difference between this botnet data, an SSL connection to a bank, or an encrypted email/file?

    The answer is you can't tell, and neither can the ISP.

    "What about the volume?" Encrypted Bittorrent.

  • by Joe U ( 443617 ) on Wednesday June 29, 2011 @08:28PM (#36617696) Homepage Journal

    The only long term solution is to infect the infected with something that low level formats their HDD.

    That will stop the problem.

    It's amazingly illegal though, so it's not happening anytime soon.

  • Invisible? (Score:5, Insightful)

    by blair1q ( 305137 ) on Wednesday June 29, 2011 @08:28PM (#36617698) Journal

    Putting the thing in the MBR just means you can't intercept it during boot.

    It doesn't for a second mean it's invisible.

  • Re:Invisible? (Score:4, Insightful)

    by vux984 ( 928602 ) on Wednesday June 29, 2011 @08:36PM (#36617776)

    It can become pretty well invisible to the infected host system though.

    A bootable CD or flash drive should take care of things, but that's a bit of a hassle, since a bootable disc needs to be up to date to detect the latest threats... or perhaps the way to go on this is to checksum the existing known good mbr and then validate it from time to time offline against the checksum.

    Speaking of which... what are people recommending for actually dealing with this sort of stuff...?

  • Chinese Justice (Score:1, Insightful)

    by msobkow ( 48369 ) on Wednesday June 29, 2011 @08:42PM (#36617810) Homepage Journal

    Collect botnet creators. Apply one bullet to head. In public.

    Repeat.

    Nothing else will stop the leeches.

  • by Anonymous Coward on Wednesday June 29, 2011 @08:56PM (#36617912)

    "per the usual", eh? Cocky much?

    Take a moment to cogitate on where the "root" in rootkit comes from.

  • by geekmux ( 1040042 ) on Wednesday June 29, 2011 @09:05PM (#36617962)

    Just throw a clause in the Terms and Conditions that states the subscriber is required to maintain an outgoing connection free of malware. Otherwise, the ISP gets to redirect all traffic to a "Hey, you're infected!" page for the duration.

    And as this particular one operates, good luck discerning a valid encrypted connection from a invalid/infected one.

    The first time the subscriber calls in to say it's rectified, remove the redirection and monitor it. The second time, be nice and request some proof. The third time, require a faxed copy of a receipt/invoice/statement from a third party verifying that all the connected in the residence are clean and all wireless networks are encrypted securely. Rinse, lather, repeat.

    Wow, faxed copy? What's next, a notarized statement and sworn testimony? After that, it'll be a race to see which falls faster; your customer base or your stock price.

  • by Fractal Dice ( 696349 ) on Wednesday June 29, 2011 @09:05PM (#36617966) Journal
    Isn't command and control the antithesis of indestructability? Any software that can be patched can be destroyed.
  • by farseeker ( 2134818 ) on Wednesday June 29, 2011 @09:46PM (#36618234)

    The third time, require a faxed copy of a receipt/invoice/statement from a third party

    Yeah, because I still live in 1998 and work at a law firm, and thus have access to a fax machine

  • Re:Here's an idea (Score:4, Insightful)

    by jmorris42 ( 1458 ) * <{jmorris} {at} {beau.org}> on Wednesday June 29, 2011 @10:01PM (#36618320)

    > What if someone wrote malware that would run a VM from the boot sector, and
    > then ran your existing OS from the VM?

    You would notice when your 3D performance began to suck ass. And when either all of your devices became virtual ones or all other performance (net, disk, etc) also began to suck ass. Unless you assume a genius who can create a VM environment that works perfectly transparently, has almost zero overhead and otherwise breaks major new ground in the science; and that they waste their time on a virus instead of kicking VMWare, RedHat, QEMU, etcs ass and seizing a multi-billion dollar red hot market segment.

  • by Grishnakh ( 216268 ) on Wednesday June 29, 2011 @10:18PM (#36618428)

    Well if they're sending SMTP mail, then it should be easy to identify them without excessively curbing customers who have legitimate SMTP servers: place a simple limit on outgoing email.

    Normal people with their own SMTP servers probably aren't going to send more than a few dozen emails per day.

    An infected PC will send millions. No human can generate millions of emails on a keyboard, and there's little reason to think that activity might be legitimate and not spam.

    Find people sending tons of email, contact them and find out what's up, and if they don't have a really good answer, shut down their connection until they clean up their PC.

  • by Grishnakh ( 216268 ) on Wednesday June 29, 2011 @10:33PM (#36618494)

    What the heck is a "phone line"? Is that one of those things they used to have back in the 70s and 80s where your phone was connected to the wall? How quaint.

  • by unity ( 1740 ) on Wednesday June 29, 2011 @10:55PM (#36618618)
    Well that won't work, the ISPs might disable the botnets run by govt contractors.
  • Re:Not impossible (Score:5, Insightful)

    by fluffy99 ( 870997 ) on Thursday June 30, 2011 @12:02AM (#36618954)

    I work at a computer repair shop.

    We frequently encounter computers that are kitted up with boot and rootkits, TDL-4 included. Kaspersky's TDSS killer does a pretty good job of removing this stuff, and it's pretty easy to tell if the MBR as been modified. Just fire up a copy of GMER and you'll be able to tell pretty quickly. I see a lot of people posting stuff about having to wipe drives and start over from scratch. That is simply not necessary. The only reason TDL-4 is such a pain in the ass is because it is decentralized, only communicates with a handful of its infected counterparts at a time and modifies the MBR. Even then, it's not impossible to detect or even remove. Just gotta use the right tools...

    Sure you got rid of the TDL-4, but what about all the other crap it downloaded? Seriously, if the computer got owned, you can't trust it anymore. You'd never be able to find all the little things like permissions changes and registry tweaks even if you got rid of the trojan's executables. Copy your data files off, scan them really well before introducing them elsewhere, and then reformat the disk. Nuking it from orbit is the only way to be sure.

  • Re:Not impossible (Score:4, Insightful)

    by toygeek ( 473120 ) on Thursday June 30, 2011 @12:08AM (#36618994) Journal

    I do the same kind of work that AC does, and he's right. Its not impossible. Also, I'd like to introduce you to the Real World(TM) where wiping a machine at the drop of the hat isn't always an option.

  • Re:Not impossible (Score:2, Insightful)

    by Anonymous Coward on Thursday June 30, 2011 @12:58AM (#36619318)

    I would still nuke it from orbit, and the reason is very very simple: after a machine has been infected in the wild, you must treat it as untrusted. You must treat all accounts you've ever accessed with it as compromised. You don't know what it might have downloaded in the background. You don't know if they've already keylogged you or stolen other data. You don't know what new capabilities might have come out in the last 24 hours. There are entirely too many unknowns. I know security companies will tell you otherwise, but they have a product to sell. If people stopped believing their product was 100% effective and instead resorted to formatting (which IS 100% effective when done properly) then they'd be out of business. Of COURSE they say you can keep using your system afterwards.

    For me, "cleaning" a virus out is merely a way to get access to files in preparation for a format. I will NOT simply "fix" a virus infection for anyone these days, knowing that they could remain quietly compromised and later fall victim to identity theft or worse. It's just not worth chancing it.

    ALWAYS nuke an infected system after recovering uninfected data files from it. Without exception.

  • Comment removed (Score:4, Insightful)

    by account_deleted ( 4530225 ) on Thursday June 30, 2011 @04:17AM (#36620124)
    Comment removed based on user account deletion

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...