[LINK] ArsT: Anti-Malware Incursions into Consumer Devices
Roger Clarke
Roger.Clarke at xamax.com.au
Fri Apr 15 09:38:24 AEST 2011
[Now we've got experimenters, spam-suppliers, financial fraudsters
*and* US government agencies messing around inside people's devices]
DoJ, FBI set up command-and-control servers, take down botnet
By Peter Bright |
Last updated about 10 hours ago - Twerps. 14 April 2011
http://arstechnica.com/security/news/2011/04/doj-fbi-set-up-command-and-control-servers-take-down-botnet.ars
Past efforts at killing botnets-the large networks of computers
running malicious software to send spam, flood websites with traffic,
and steal personal data-have managed to disable the networks by
taking down important servers, but they've always stopped short of
actually killing the botnet software itself. That's because the
companies behind these efforts have no more legal authority to run
unauthorized software on users' machines than the botnet owners do-to
remove the botnet software would make them just as guilty of hacking
as the bad guys are.
The result is that while efforts such as Microsoft's disruption of
the Waledac and Rustock botnets were successful, they were far from
perfect. These efforts left the malicious software running on the
infected PCs-they just removed the command and control servers, the
centralized machines that tell the botnet what to do. Should the bot
herders regain control of the domain names or IP addresses used by
the command-and-control servers, the infected machines will be able
to successfully connect to them, and the networks will once again
spring into life.
A new Justice Department attack will go some way towards solving that
problem, at least for the botnet known as "Coreflood." A federal
judge has authorized the non-profit Internet Systems Consortium,
working in conjunction with the FBI, to go beyond taking down the
command-and-control servers: the ISC has installed its own
command-and-control servers. The command the servers are sending?
Kill the botnet malware. The servers were swapped out on Tuesday
evening, and the kill command was duly sent.
The kill command still stops short of removing the malware
altogether-each time an infected PC is rebooted it will try to
restart the botnet software. But every time, the new command and
control servers will tell the software to shut down, preventing it
from causing any more harm.
In tandem with this effort, Microsoft has updated its Malicious
Software Removal Tool to enable it to remove the Coreflood malware
itself. Some users will likely receive this tool through Windows
Update, but to ensure greater reach, the new command and control
servers will record every IP address that tries to reach the command
and control servers. This IP address information will be used to
inform ISPs that machines are infected. In turn, the ISPs will inform
their end users, and provide information on where to get the MSRT.
Users will also be able to opt out of the entire process, if they
would prefer to let the malware continue to run on their PCs.
Coreflood was a particularly nasty botnet. Rather than merely sending
spam, it stole banking and other financial information from infected
systems. This harvested information was then sent to the
command-and-control servers, and according to court filings, allowed
criminals to steal hundreds of thousands of dollars from victims. The
Coreflood software has been around since 2003, receiving regular
updates in an effort to keep one step ahead of anti-malware software.
It started out as a regular trojan-a program that masquerades as
something useful but which actually does something harmful-before
gaining botnet capabilities in 2009. Over the course of its life,
more than two million machines were infected.
Though this aggressive move is likely to be effective in combatting
the botnet, not everyone is convinced that it's an appropriate path
to go down. Speaking to Wired, Electronic Frontier Foundation
technology director Chris Palmer described it as an "extremely
sketchy action to take," warning that "you don't know what's going to
happen for sure. You might blow up some important machine."
Aggressive as it was, other nations have gone further to fight the
botnet menace. Last year, Dutch and Armenian law enforcement made a
joint effort to kill off the Bredolab botnet. In this case, the Dutch
authorities installed their own command-and-control servers, using
them to distribute a program to infected computers that would
redirect users to a website giving specific information on how to
disinfect their computers. This seemed to work well, with authorities
reporting more than 100,000 visits to the site.
There's no word yet on how effective the Justice Department's plan
has been. If manual outreach proves effective then there may be no
need to go one step further as the Dutch did. But if persistent
infections continue to be an issue-as they are with Rustock and
Waledac-then American law enforcement may well be tempted to take
more proactive measures against the botnets, in spite of the concerns
this raises.
--
Roger Clarke http://www.rogerclarke.com/
Xamax Consultancy Pty Ltd 78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au http://www.xamax.com.au/
Visiting Professor in the Cyberspace Law & Policy Centre Uni of NSW
Visiting Professor in Computer Science Australian National University
More information about the Link
mailing list