|
Tweet Follow @spamhaus |
|
|||||||||||||||||
![]() Poor sending practices trigger a tidal wave of informational listings Spamhaus Botnet Threat Update: Q4-2021 SERVICE UPDATE | Spamhaus DNSBL users who query via Cloudflare DNS need to make changes to email set-up Spamhaus Botnet Threat Update: Q3-2021 Spammer Abuse of Free Google Services Spamhaus Botnet Threat Update: Q2-2021 Emotet Email Aftermath Wordpress compromises: What's beyond the URL? Older News Articles: ![]() ![]() |
Spamhaus tracks both Internet Protocol (IP) addresses and domain names used by threat actors for hosting botnet Command & Control (C&C) servers. This data enables us to identify malware, location, and the hosting provider associated with botnet C&Cs. In this report, we look at key trends from 2019 and highlight the operators who are struggling with the number of botnet C&Cs associated with their particular operations. In addition, we provide insight as to what can be done to reduce global botnet threats, alongside offering some recommendations for ways that SOCs, CERTs, and CSIRTs can protect their business and users from these threats. Download the full Botnet Threat Report 2019 as PDF. Number of botnet C&Cs observed in 2019
Botnet controllers – a brief explanationA ‘botnet controller,’ ‘botnet C2’ or ‘botnet command & control’ server, is commonly abbreviated to ‘botnet C&C.’ Fraudsters use these to both control malware infected machines and to extract personal and valuable data from malware-infected victims. Botnet C&Cs play a vital role in operations conducted by cybercriminals who are using infected machines to send out spam, ransomware, launch DDoS attacks, commit e-banking fraud, click-fraud or to mine cryptocurrencies such as Bitcoin. Desktop computers and mobile devices, like smartphones, aren’t the only machines which can become infected. There is an increasing number of devices which are connected to the internet, for example, the Internet of Things (IoT) devices, such as webcams, or network attached storage (NAS). These are also at risk of becoming infected.
To understand how ‘popular’ botnet C&Cs were as a cybercriminal’s vector of choice in 2019, we reviewed the Spamhaus Block List (SBL). We looked at how many listings on this blocklist were issued for botnet C&Cs. In 2019, almost every other SBL listing issued by Spamhaus was for a botnet C&C server, another significant annual increase: Botnet C&Cs as a percentage of all SBL listings 2017–19
Geolocation of botnet C&Cs in 2019Russia takes the top spot: Having spent several years as the top country for hosting botnet C&Cs, the United States was knocked off its number one spot in 2019 by Russia, which experienced a 143% increase in botnet C&C traffic. This increase doesn’t surprise us. Law enforcement is less focused on internet abuse in Russia than in Western countries, and many of those providing the internet infrastructure in Russia have more lax registration procedures. Later in this report it will be shown that Russia is the most frequently recurring location of Internet Service Providers who are hosting the highest volumes of botnet C&C traffic on their networks. China leaps up the chart: In one year, China has moved up the chart to fourth place, up from thirteenth place in 2018. It has experienced a 390% increase in the number of botnets it hosted in 2019. This percentage increase was only surpassed by Switzerland, which experienced a massive 1,119% increase from 21 in 2018, to 256 in 2019. Departures: Chile, Italy, Malaysia, Poland, South Africa and Turkey all dropped off the Top Twenty list in 2019. New entries: Luxemburg (#7), Greece (#9), Serbia (#15), India (#17), Sweden (#19) and Argentina (#20) were all new entries to the list in 2019.
Malware associated with botnet C&Cs in 2019In 2019, some malware families almost completely disappeared, while others evolved. Credential Stealers: Nearly 60% of the newly detected botnet C&Cs in 2019 were associated with credential stealers. Lokibot not only remained in the #1 position but also increased its number of associated botnet C&Cs by 74%, compared to 2018 figures. Fellow credential stealer AZORult joined Lokibot at the top of the chart, in the #2 position. Emotet + TrickBot: In 2019, we observed an increase in Emotet and TrickBot malspam campaigns and infections. Traditionally, these two malware families have been used by miscreants to commit ebanking fraud. However, over the past two years, we have seen threat actors moving away from the traditional ebanking fraud model to a Pay-Per-Install (PPI) model. In 2019, Emotet and TrickBot were extremely active, predominantly with Emotet either propagating itself, or being used to drop additional ransomware i.e.TrickBot. Remote Access Tools (RATs): In addition to credential stealers and droppers, RATs were the second highest malware family, accounting for 19% of botnet C&Cs. In 2018 we reported that a large amount of RAT botnet C&C infrastructure was associated with Adwind/Jbifrost, but in 2019 this particular RAT reduced by 78%. It was quickly replaced with NanoCore, which increased by 181% in 2019 and rose to #3 spot on our chart. Another RAT that disappeared in 2019 was ImminentRAT, which was taken down by the Australian Federal Police (AFP) in 2019. New entries: Credential stealers: Predator Stealer (#9), KPOTStealer (#12) and HawkEye (18), RATs: QuasarRAT (#16), ebanking Trojan: Dridex (#17) and IcediD (#19).
Number of botnet C&C domain names registered in 2019
The importance of domain names:Cybercriminals prefer to use a domain name registered exclusively to host the botnet C&C. A dedicated domain name allows them to fire up a new virtual private server (VPS), load the botnet C&C kit, and immediately be back in contact with their botnet after their (former) hosting provider shuts down their botnet C&C server. Not having to change the configuration of each infected computer (bot) on the botnet is a major advantage.
Domain name registrations for botnet C&C hostings 2017–19
Most abused top-level domains in 2019
Top-level domains (TLDs) – a brief overviewThere are several different top-level domains including: Generic TLDs (gTLDs) – can be used by anyone Country code TLDs (ccTLDs) – some have restricted use within a particular country or region; however, others are licensed for general use giving the same functionality of gTLDs Decentralized TLDs (dTLDs) – independent top-level domains that are not under the control of ICANN .com & .net: These top two TLDs accounted for approximately 50% of the botnet C&Cs in 2019. Taking into account the sheer size of both these zones, the diversity of the .com and .net registrar ecosystem and the somewhat complicated situation around abuse policies (see the recent discussions at ICANN trying to define ‘DNS Abuse’), we do not see this changing anytime soon. Global Registry Services Ltd: Eight top-level domains (TLDs) dropped off the most abused TLD Top 20 list in 2019. Six of those eight are managed by Global Registry Services Ltd, who have clearly made a concerted effort to clean up their TLDs. New entries: .net (#2), .cm (#6), .org (#10), .eu (#14), icu (#16), su (#17), site (#18) & name (#20) have all made it onto the Top 20 list in 2019. .bit: In our 2018 Botnet Threat Report, we raised concerns about the increase of botnet C&C domain names hosted on the decentralized TLD .bit. In Q2 2019, OpenNIC voted to drop .bit from their resolvers. As a result, any botnet that relied on OpenNIC to resolve .bit stopped functioning, leading to the number of botnet C&C domains within .bit dropping to almost zero. .pw: This TLD topped the rankings in 2018; however, we observed a 92% reduction in the amount of botnet C&Cs associated with .pw in 2019, dropping it down to #5.
Most abused domain registrars in 2019
Fast fluxBotnets use this DNS technique to obscure phishing sites, or domains for downloading malware. This is done by placing the phishing or malware behind an ever-changing network of compromised hosts, which act as proxies. Namecheap was (again) the most abused registrar: Around 25% of all botnet C&C domain names were registered through this US-based registrar. It’s the third consecutive year that Namecheap has held the pole position in our annual ranking of most abused domain registrars. Key-Systems used for fast flux hosting: In 2019, we saw an increase of fraudulent domain registrations with Key-Systems. A key point to note is that many of the C&C domains that were hosted on fast flux networks were registered through this particular registrar. Hosting Concepts used for bulletproof hosting: The new bulletproof hosting outfit Spamhaus identified in the latter half of 2019 has been heavily utilising this registrar for registering botnet C&C domains for their customers. As a result, this Dutch registrar made it onto our chart for the first time. Alpnames shut down by ICANN: In March 2019, ICANN shut down this Gibraltar based domain registrar. As a result, the number of newly registered botnet C&Cs domain names at this registrar dropped down to zero. New entries: Key Systems (#5), WebNic.cc (#6), Hosting Concepts (#8), 55hl.com (#9), Hostinger (#13), GMO (#14). Departures: Out of the five domain registrars that dropped off the Top Twenty list in 2019 (excluding Alpnames), four were based in the United States: Enom, Network Solutions (aka web.com), Register.com & Tucows.
New bulletproof hosting operator increased number of botnet C&Cs in 2019
What is a ‘fraudulent sign-up’?This is where a miscreant is using a fake, or stolen identity, to sign-up for a service. This service is usually a VPS or a dedicated server, for the sole purpose of using it for hosting a botnet C&C. Fraudulent sign-ups 2018–19
Botnet C&Cs resulting from fraudulent sign-ups in 2019When a botnet C&C is noted to be the result of a fraudulent sign-up, it is subject to a listing on the Spamhaus Botnet C&C List (BCL). The graph below shows the overall number of botnet C&C listings versus the number of botnet C&C listings on the BCL between 2014–2019. In 2019, we averaged approximately 1,130 BCL listings per month. This is more than double the average in 2018 (530 per month). With the above mentioned new bulletproof hosting operation, we feel confident that the number of fraudulent sign-ups at hosting providers will increase in 2020 unless hosting providers implement more robust customer verification processes. Total of newly detected botnet C&C listings vs newly detected BCL listings 2014–2019
Spamhaus Botnet C&C Listings (BCL) per month
ISPs hosting botnet C&Cs in 2019
Outdated software makes for an easy targetIt is a simple task for a cybercriminal to scan the internet for servers or websites that are running outdated or vulnerable software. Some of the most popular open source content management systems (CMS) like WordPress, Joomla, Typo3 or Drupal are especially popular targets, due to the high number of poorly maintained installations of these packages. Preventing Botnet C&Cs on compromised servers or websites: It can be difficult for an ISP or hosting provider to do this since these are often under the control of the customer. Many servers and websites are running outdated software, making them vulnerable to attacks from the internet. We have seen that some of the more proactive ISPs and hosting providers are now using newer tools and methods to track down outdated software and monitor botnet C&C traffic. Of course, blocking traffic to known botnet C&Cs is a good start. Preventing Botnet C&Cs on servers used solely for hosting a botnet C&C: ISPs have far more control in this situation since when a new customer tries to sign-up, a customer verification/vetting process should take place before commissioning the service. Where ISPs have a high number of BCL listings (botnet C&Cs hosted on servers solely for that purpose, i.e., a fraudulent sign-up) it highlights one of the following issues:
The larger the ISP, the larger the volumes of abuse. While it may seem obvious, it’s important to remember that due to their increased hosting capabilities, the bigger ISPs and hosting providers have a higher volume of poorly patched servers and websites on their network.
Cloudflare – the top botnet C&C hosting network: Cloudflare is a Content Delivery Network (CDN) provider from the US. While they do not directly host any content, they provide services to botnet operators, masking the actual location of the botnet controller and protecting it from DDoS attacks. Many cybercriminals sign-up for Cloudflare’s free plan with the sole purpose of using it exclusively for hosting a botnet C&C. Usually, such a listing would be placed on our BCL; however, because the hosting of the botnet C&C is on a Cloudflare shared IP address, it is placed on the SBL. In this extraordinary circumstance, we have chosen to list the same figures in both charts. New entries: simplecloud.ru (BCL #3), ovh.net (BCL #4), reg.ru (BCL #6), fos-vpn.org (BCL #8), stajazk.ru (BCL #10), marosnet.ru (BCL #12), m247.ro (BCL #14), spacenet.ru (BCL #15), itos.biz (BCL #16), netangels.ru (BCL #19), greenvps.net (BCL #20) are all newcomers to our Top Twenty BCL rankings. It is interesting to note that out of these eleven ISPs with botnet C&Cs on their network as a result of fraudulent sign-ups, 73% are Russian based. ISPs with only BCL listings: Newcomers greenvps.net and netangles.ru are the only networks that we have seen with botnet C&C listings on the BCL alone. We weren’t able to find a single compromised server or website that was abused for botnet C&C hosting on any of these networks, signaling that all the sign-ups on these two networks were fraudulent. Recurring entries: Unfortunately, with the exception of selectel.ru, all the ISPs listed on our 2018 Top Twenty BCL list saw a significant increase in the amount of botnet C&Cs on their networks as a result of fake registrations in 2019. Departures: gerber-edv.net & anmaxx.net: We suspect both have been rebranded, and swiftway.net has disappeared. Meanwhile the following companies appear to be successfully trading, and therefore we assume have appropriately dealt with the botnet C&C abuse on their networks; iliad.fr, morene.host, neohost.com.ua, dataclub.biz, hostsailor.com, eksenbilisim.com.tr, digitalocean.com, choopa.com, melbicom.net, zare. com, and tencent.com. ConclusionEast/West Divide: On reading this report the divide between East and West is obvious, with the East lagging behind the West, both in terms of robust sign-up procedures, and in enforcement focused on taking down cybercriminal activity. Criminals will always follow the path of least resistance, be that registering their domain with a Chinese registrar or using a Russian ISP, neither of which follow rigorous sign-up processes. Emotet & Trickbot: Our researchers have noted a huge increase in the number of Emotet and TrickBot malspam campaigns and infections. Despite having a ‘holiday’ in June, July and August, Emotet ramped up its activity towards the end of last year. Emotet’s behavior and characteristics are constantly changing to make it more and more dangerous. DGA usage is dropping. This is good news, and illustrates that with a combined effort from the industry, positive changes can be made. New botnet bulletproof hosting operator: We do have concerns in regard to the appearance of this operator. Worryingly, the set-up for cybercriminals is more cost-effective, less risky, and provides greater agility when compared with that of ‘conventional’ bulletproof hosting, making it easier for them to host all kinds of badness. It is crucial that hosting providers across the globe stop allowing customers to fraudulently sign up for services. Otherwise, the 16% increase in botnet C&Cs associated with fraudulent sign-ups in 2019 will continue to rise in 2020. Compromised websites: We have seen a shift to cybercriminals using compromised website domain names for their botnet C&Cs, rather than buying their own domains. This adds complexity to take downs. Therefore, it is imperative that everyone who runs a website ensures theirs is secure. Recommended precautionary actionsIn such a rapidly changing environment a flexible and swift (if not automated) approach is required by those who protect networks and users. In addition to current security measures that are currently implemented, based on the botnet C&C threats observed in 2019, we recommend the additional following precautionary actions:
Download the full Botnet Threat Report 2019 as PDF. |
![]() ![]() ![]() ![]() ![]() ![]() |
![]() Permanent link to this news article: Spamhaus Botnet Threat Report 2019 http://www.spamhaus.org/news/article/793/spamhaus-botnet-threat-report-2019 ![]() |
![]() Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record. |
|