分类: 网络与安全
2013-01-30 22:16:56
our criminal can be assured that his Zeus bot agents have no antivirus signature recognition.
The net result is that multiple variants of a single bot agent report to the same C&C and are controlled by the same
criminal, but use different passwords and encryption, and require different signatures to detect their presence.
Figure 1: The DIY bot creator kit is
used by the criminal to create multiple
bot agent variants (A,B and C). All bot
agents are configured to report in to a
single C&C infrastructure operated
and maintained by the criminal.
Multiple Kit Operators
DIY bot kits are purchased by a wide
variety of would-be criminals. Each
operates independently from the
others, selecting unique C&C
channels, encryption keys,
administrative passwords and
methods of communication. This
swarm of different botnets use the
same malware creator kit, but require
different malware detection
signatures and are operated
independently by criminals with a
variety of motivations.
All subsequent botnets share the
same malware family name – even if
they are operated by different
criminals using different C&C
channels. The method of
compromised host cleanup, however,
will be the same. In other words, the
same remediation processes can
typically be used for all malware created by a specific version of the same creator kit – regardless of which criminal
happens to control a particular botnet based on that kit.
Figure 2: Two criminals both purchase the
same DIY bot creator kit and produce their
own bot agents. The first criminal creates bot
agents A, B and C that point to a single C&C
infrastructure under his direct control. The
second criminal uses his own copy of the DIY
bot creator kit to build bot agents A, B and C,
and then points them to his own C&C
infrastructure. All six bot agents are variants
of the same malware type, but are operated
by two independent criminals.
Multiple DIY Botnet Kits
This increasingly large pool of DIY botnet creator kits is a major contributor to sustainable botnet growth. The
development and sale of these DIY kits is a business unto itself, and a highly competitive one at that. As such, any
would-be criminal can select from a growing list of multi-function DIY kits – each one capable of producing its own unique
family of bot agents and malware.
Criminals construct botnets that are even more resilient to existing host-based detection technologies by using multiple
kits to create armories of bot agents. If a popular antivirus tool detects all offspring created by a version of a popular DIY
bot creator kit (or a new behavioral technique for identifying a popular infection vector), it could potentially destroy the
criminal’s botnet. Therefore, no single detection algorithm (or cleanup process) will be capable of wiping out an entire
botnet if the deployed bot agents were created using multiple and different DIY kits.
The significance of this tactic is that a single criminal operator can employ entirely different malware components that all
utilize the same C&C infrastructure, yet still control them as a single botnet. In other words, this botnet operates
independently from the type of bot agent used, which greatly complicates remediation. The identification of one strain of
the botnet’s agents will no longer counter the entire botnet threat.
Figure 3: A criminal botnet operator procures three different and unrelated DIY bot creator kits and uses them to create a
sequence of distinct bot agents (A-F) prior to distribution. All botnet agents are configured to use the same C&C
infrastructure.
Conclusion
The use of DIY bot creator kits is a growing concern that has a direct impact on the way in which organizations must
evaluate and protect against the botnet threat. The relative ease of access to such DIY kits makes it trivial for criminals to
construct new botnets that are statistically immune to host-based protection systems, yet appear to be almost identical
from a malicious software perspective and communicate with a single C&C.
Because organizations have traditionally classified the botnet threat by their malware name rather than by the criminals
who operate them, they have found it difficult to grasp the dynamics of building botnets and have faltered in building
suitable defense strategies. By understanding the fallacies of the one-to-one malware to botnet myth, organizations
should be in a better position to focus upon the criminal entities that target their business. The goal is to counter the
threat at its source within the network layer – and more efficiently employ remediation solutions for compromised hosts.
About Damballa
Damballa is a pioneer in the fight against cybercrime. Damballa provides the only network security solution that detects
the remote control communication that criminals use to breach networks to steal corporate data and intellectual property,
and conduct espionage or other fraudulent transactions. Patent-pending solutions from Damballa protect networks with
any type of server or endpoint device including PCs, Macs, Unix, smartphones, mobile and embedded systems.
Damballa customers include mid-size and large enterprises that represent every major market, telecommunications and
Internet service providers, universities, and government agencies. Privately held, Damballa is headquartered in Atlanta.
Prepared by:
Damballa Inc.
Copyright 2009. All rights reserved worldwide