SUBSCRIBE

Microsoft: No botnet is indestructible

No botnet is invulnerable, a Microsoft Corp. lawyer involved with the Rustock take-down said, countering claims that another botnet was โ€œpractically indestructible.โ€

โ€œIf someone says that a botnet is indestructible, they are not being very creative legally or technically,โ€ Richard Boscovich, a senior attorney with Microsoftโ€™s Digital Crime Unit said Tuesday. โ€œNothing is impossible. Thatโ€™s a pretty high standard.โ€

Instrumental in the effort that led to the seizure of Rustockโ€™s command-and-control servers in March, Boscovich said Microsoftโ€™s experience in take-downs of Waledac in early 2010 and of Corefloodย and Rustock this year show that any botnet can be exterminated.

โ€œTo say that it canโ€™t be done underestimates the ability of the good guys,โ€ Boscovich said. โ€œPeople seem to be saying that the bad guys are smarter, better. But the answer to that is โ€˜no.โ€™ โ€œ

Last week, Moscow-based Kaspersky Labs called the TDL-4 botnet โ€œthe most sophisticated threat today,โ€ and argued that it wasย โ€œpractically indestructibleโ€ย because of its advanced encryption and use of a public peer-to-peer (P2P) network as a fall back communications channel for the instructions issued to infected PCs.

Take-downs like Waledac, Rustock and Coreflood have relied on seizing the primary command-and-control (C&C) servers, then somehow blocking the botnetโ€™s compromised computers from accessing alternate C&C domains for new instructions.

By doing both, take-downs decapitate the botnet, let researchers or authorities hijack the botnet, and prevent hackers from updating their malware or giving the bots new orders. That also gives users time to clean their systems of the infections with antivirus software.

Kaspersky senior malware researcher Roel Schouwenberg said that TDL-4โ€™s use of P2P made the botnet an extremely tough nut.

โ€œAny attempt to take down the regular C&Cs can effectively be circumvented by the TDL group by updating the list of C&Cs through the P2P network,โ€ Schouwenberg said last week. โ€œThe fact that TDL has two separate channels for communications will make any take-down very, very tough.โ€

Boscovich disagreed, noting that theย February 2010 take-down of Waledacย successfully suppressed that botnetโ€™s P2P command channel.

โ€œ[Waledac] was a proof of concept that showed we are able to poison the peer-to-peer table of a botnet,โ€ Boscovich said.

โ€œEach take-down is different, each one is complicated in its own way,โ€ said Boscovich. โ€œEach one is going to be different, but that doesnโ€™t mean that there cannot be a way to do this with any botnet.โ€

Alex Lanstein, a senior engineer with FireEye who worked withย Microsoftย on the Rustock take-down, said that the relationships Microsoft has built with others in theย securityย field, with Internet service providers, and with government legal agencies like the U.S. Department of Justice and law enforcement were the most important factors in its ability to take down botnets, any botnets.

โ€œItโ€™s the trust relationships Microsoft has created,โ€ said Lanstein, that have led to successful take-downs. โ€œAnd I think [the technique] speaks to any malware infrastructure where some kind of data feed exists. It really, really works.โ€

Boscovich and Lanstein were opposed not only by Kasperskyโ€™s Schouwenberg, but also by Joe Stewart, director of malware research atย Dellย SecureWorks and an internationally known botnet expert.

โ€œI wouldnโ€™t say itโ€™s perfectly indestructible, but it is pretty much indestructible,โ€ Stewart said in an interview last week about TDL-4. โ€œIt does a very good job of maintaining itself.โ€

But SecureWorks also acknowledged Microsoftโ€™s take-down chops, saying that its own statistics show that Rustock attacks have dropped ten-fold since March.

โ€œSince mid-March 2011, Dell SecureWorksโ€™ CTU [Counter Threat Unit] research team has seen a significant decline in the number of attempted Rustock attacks, and we do attribute it to the comprehensive efforts of Microsoft,โ€ a SecureWorks spokeswoman said Tuesday.

โ€œWith the Rustock take-down, Microsoft has built the framework for others to do the same,โ€ Lanstein said. โ€œThis is definitely not the last botnet weโ€™re going to go after.โ€

He declined to name the next likely target, saying that doing so would tip Microsoftโ€™s and FireEyeโ€™s hand.

Tech Jobs

Categories