VB2014 paper: Hiding the network behind the network. Botnet proxy business model

Posted by   Virus Bulletin on   Oct 28, 2014

Cristina Vatamanu and her colleagues describe how botherders keep their C&C servers hidden.

Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added 'Hiding the network behind the network. Botnet proxy business model' by Bitdefender researchers Alexandru Maximciuc, Razvan Benchea and Cristina Vatamanu.

One of the most difficult parts of running a botnet is how to hide the command and control (C&C) servers. Early botnets used fixed IP addresses or fixed domain names, but that made them very vulnerable to takedowns by law enforcement or security researchers.

Modern botnets use more advanced techniques, such as domain generation algorithms (DGAs), Tor, or even fancy techniques such as Yahoo! Mail, but each of these has its own set of problems.

However, there seems to be no problem in cybercrime for which there aren't other cybercriminals who can provide a solution. In their paper, which was presented by Cristina Vatamanu in Seattle, Alexandru Maximciuc, Razvan Benchea and Cristina Vatamanu describe a proxy network that is rented to botnet owners for C&C communication.

Using multiple layers, the proxy network (which is explained in full detail in the paper) is very cleverly designed. This didn't just make the botnet traffic hard to detect, it also frustrated the researchers' attempts to take down the botnet.

During their research, Cristina and her colleagues filed several abuse reports against IP addresses used in the proxy network. However, in all such cases the network was able to add different IP addresses very quickly.

Among the 'customers' of this botnet were 'Citadel' and 'CryptoLocker'. The former was the subject of a research paper we recently published (part 1, part 2), while in her presentation Cristina shared details of the researchers' attempts to disrupt the infamous CryptoLocker ransomware.

You can read the paper here in HTML-format, or download it here as a PDF (no registration or subscription required). You can download the presentation slides here. We have also uploaded the presentation to our YouTube channel.



Posted on 28 October 2014 by Martijn Grooten
twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2018 paper: Tracking Mirai variants

Today, we publish the VB2018 paper by Qihoo 360 researchers Ya Liu and Hui Wang, on extracting data from variants of the Mirai botnet to classify and track variants.

VB2018 paper: Hide'n'Seek: an adaptive peer-to-peer IoT botnet

2018 has seen an increase in the variety of botnets living on the Internet of Things - such as Hide'N'Seek, which is notable for its use of peer-to-peer for command-and-control communication. Today, we publish the VB2018 paper by Bitdefender…

New paper: Botception: botnet distributes script with bot capabilities

In a new paper, Avast researchers Jan Sirmer and Adolf Streda look at how a spam campaign sent via the Necurs botnet was delivering the Flawed Ammyy RAT. As well as publishing the paper, we have also released the video of the reseachers' VB2018…

VB2018 video: Behind the scenes of the SamSam investigation

Today we have published the video of the VB2018 presentation by Andrew Brandt (Sophos) on the SamSam ransomware, which became hot news following the indictment of its two suspected authors yesterday.

VB2018 video: Foreverdays: tracking and mitigating threats targeting civil society orgs

Today, we publish the video of the VB2018 presentation by CitizenLab researchers Masashi Nishihata and John Scott Railton, on threats faced by civil society.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.