New paper: A review of the evolution of Andromeda over the years

Posted by   Martijn Grooten on   Feb 7, 2018

In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or Wauchos.

Such takedowns have become a common feature in the fight against online crime, though there have been many instances where a disrupted botnet has subsequently been resurrected. That's unlikely to happen in this case though, as in the same month as the takedown, the suspected owner of the botnet was arrested in Belarus.

The fact that it seems likely we have seen the end of Andromeda makes this a good opportunity to look back at the botnet which, for more than half a decade, plagued computer users around the globe.

Fig17.png

Andromeda at a glance.

Today, we publish an analysis of Andromeda by Fortinet researchers Bahare Sabouri and He Xu, in which they look at the malware, its anti-analysis tricks, its C&C traffic, and how it has evolved over the years. The article is published both in HTML and PDF format.

If you have analysed a malware family, or looked at a threat campaign, why not submit a paper for VB2018, which will take place in Montreal in October? The Call for Papers is open until 18 March 2018.

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Throwback Thursday: Giving the EICAR test file some teeth

The 68-byte EICAR test file plays as important a role today as it did 19 years ago. In this week's Throwback Thursday we look back at a VB99 conference paper in which Randy Abrams described how this 'miracle tool' worked and how it could be used.

XMRig used in new macOS cryptominer

A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.

Tendency for DDoS attacks to become less volumetric fits in a wider trend

CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.

Turkish Twitter users targeted with mobile FinFisher spyware

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.

Hide'n'Seek IoT botnet adds persistence

The Hide'n'Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.