19 April, 2015

McAfee Labs “Catch Me If You Can: Antics of a Polymorphic Botnet”

International effort takes down ever-changing Beebone botnet  
Several global law enforcement agencies—with assistance from Intel Security—last week successfully dismantled the “Beebone” botnet behind a polymorphic worm known by Intel Security as W32/Worm-AAEH.
Intel Security first identified the threat in March 2014 and in September 2014 collected enough data about the threat to approach international crime agencies for their support and involvement. Intel Security then worked with Europol’s European Cybercrime Centre (EC3), the Dutch authorities, the U.S FBI, and other private sector partners in a collaborative effort to successfully takedown the cyber threat.
The Beebone botnet, which facilitates the downloading of other types of malware onto victim’s machines —including banking password stealers, rootkits, fake antivirus, and ransomware –was responsible for malware infections of thousands of systems worldwide, across 195 countries. The malware includes wormlike functionality to spread quickly to new machines by propagating across networks, removable drives (USB/CD/DVD), and through ZIP and RAR archive files. At one of its peaks in 2014, more than 100,000 infections of the Beebone botnet was detected by the McAfee Labs team. As this figure included only telemetry from Intel Security, it is suspected this was likely to be much higher.
Commenting on the operation Raj Samani, Intel Security EMEA CTO said: “Intel Security, along with a global law enforcement collaboration including the Dutch High Tech Crime Unit, Europol, and FBI, has successfully dismantled the polymorphic worm known as W32/Worm-AAEH/Beebone. Intel Security is aware of more than 5 million unique AAEH samples with more than 100,000 machines from 200 countries identified. This kind of takedown could not of happened without the cooperation between police organisations and private companies like Intel Security.”
Intel Security worked closely with crime authorities and other security providers to develop tools which lead to the successful eradication of the botnet threat, which included the takedown of 100 domains.
“This operation is further evidence that only a combined response is capable of slowing down the every growing menace of cybercrime. With both public and private agencies working together to battle the ever-evolving cyber-threat do we have a chance of bringing them down and making the online world a safer place for all,” concluded Samani.
  
Key Points
  • Intel Security has played a leading role in Operation Source, a law enforcement action in coordination with Europol, Dutch police, the U.S. FBI, Kaspersky, and Shadowserver to take down a “polymorphic” botnet responsible for infecting tens of thousands of victim systems across 195 countries.
  • Beebone is a “polymorphic” botnet, so named because it was capable of periodically updating malware on infected systems with slightly adjusted code. This ability to continuously “morph” its code allowed Beebone to elude some detection methods and spread more than 5 million unique samples.
  • Intel’s McAfee Labs identified Beebone in March 2014 and developed an automated monitoring system to identify and mimic communications between the botnet and its hosts. Operation Source leveraged Intel’s intelligence from this monitoring to enable law enforcement, ISP, and CERT partners to successfully suspend or seize all domain names used by the botnet, effectively deactivating its operations.
  • Additionally, Intel Security will release a free tool to allow IT administrators and individual users to clean and restore computers infected by Beebone.  
  • The McAfee Labs team (Raj Samani, Anand Bodke, Abhishek Karnik, Sanchit Karve, and Rick Simon) has released a whitepaper (attached) and blog explaining how they “hacked the hackers” by developing the automated system.
=