Last-minute paper: Anonymizing VPN services as a botnet monetization strategy — analysing the Bunitu botnet

Thursday 1 October 11:00 - 11:30, Green room

Sergei Frankoff (Sentrant)
hasherezade (Malwarebytes)

  download slides (PDF)

The Bunitu botnet makes use of a unique monetization strategy where proxy services are installed on the infected hosts and controlled by the botnet. Access to these proxies is then sold through a web store as an anonymizing VPN service. Though this monetization strategy has been observed in the past, related to the TDSS botnet, the Bunitu developers have improved on the previous malware proxy technology and removed the need for the host to have a public IP.

In addition to HTTP and SOCKS proxies, both of which Bunitu installs, a third malware proxy is also installed. This third proxy establishes a connection out from the infected host to an intermediary server. Clients can then connect to the intermediary server which tunnels the client traffic back down the open connection from the infected host. This acts like a type of reverse tunnel (for those familiar with SSH). The use of this tunnelled proxy allows the Bunitu botnet to monetize hosts that are behind firewalls and would not normally be accessible from the Internet. It also allows the botnet to sell access to the infected hosts through a 'VPN' service rather than just a proxy service.

Our research into the infrastructure that is supporting the Bunitu botnet and the type of traffic that is being routed through the Bunitu infected hosts led us to identify one of the web stores that is selling an 'anonymized VPN' service built on the Bunitu botnet. We also developed tools for interacting with the Bunitu botnet, which we have published for other researchers to replicate and build on our work.

We will present our analysis of the Bunitu botnet including the malware proxy technology used, the C&C protocol, and the results from our investigation into the infrastructure behind the botnet and the anonymizing VPN services who sell access to the botnet proxies. We will also provide a short overview of this unique monetization scheme and compare it with other current threats related to VPN/proxy services.

Click here for more details about the conference.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.