The malware behind an "indestructible" botnet
Posted on 30.06.2011
It took only three months for the TDL rootkit - also known as Tidserv, TDSS and Alureon - to add over 4,5 million infected computers to the developers' botnet, say Kaspersky Lab researchers.


Back in 2010, its authors have surprised researchers by selling the source code for the TDL3 version, but now they know that this move has been the result of the creation of the next variant - TDL4. TDL4 was different enough from the previous one and improved in such a way that the developers believed that the sold variant wouldn't be able to compete with it.

And they were right. The improvements were considerable.

The new version still spreads via affiliates, and the malware is often found on booby-trapped sites with adult content and pirated material, as well as sites for image or video storing. It installs itself by taking advantage of known vulnerabilities, but that's about the only thing that remained the same.

"The owners of TDL are essentially trying to create an ‘indestructible’ botnet that is protected against attacks, competitors, and antivirus companies," point out the researchers.

And to achieve that, the new TDL variant uses custom algorithms for encrypting the communication between the bots and the botnet C&C centers, in order to protect said communication from network traffic analysis and to block other cybercriminals' attempts of taking over the botnet.

The new version also turned TDL into a bootkit. Its code is embedded in the computer's master boot record (MBR) which makes it more difficult to detect via AV solutions.

The bot also downloads other malicious programs (fake AVs, adware, spambots) and tries to hide them from said products, but also deletes around twenty other types of malicious software (like Zeus, Gbot, etc.)

"TDSS scans the registry, searches for specific file names, blacklists the addresses of the command and control centers of other botnets and prevents victim machines from contacting them," explain the researchers. "This ‘antivirus’ actually helps TDSS; on the one hand, it fights cybercrime competition, while on the other hand it protects TDSS and associated malware against undesirable interactions that could be caused by other malware on the infected machine."

Another thing that the TDL developers have managed do is to make the bots receive their commands via a public P2P network, which makes the botnet impervious to the shutdown of C&C centers.

Among the other things this bot is capable of doing is to offer anonymous network access via infected machines by using a module that establishes a proxy server on them. "Having control over such a large number of computers with this function, the cybercriminals have started offering anonymous Internet access as a service, at a cost of roughly $100 per month," say the researchers.

"The fact that TDL-4 code shows active development — a rootkit for 64-bit systems, the malware running prior to operating system start launches, the use of exploits from Stuxnet’s arsenal, P2P technology, its own ‘antivirus’ and a lot more — place TDSS firmly in the ranks of the most technologically sophisticated, and most complex to analyze, malware," they point out. "TDSS and the botnet that unites all the computers it infects will continue to cause problems for users and IT security professionals alike. The decentralized, server-less botnet is practically indestructible, as the Kido epidemic showed."






Spotlight

Review: Bulletproof SSL and TLS

Posted on 12 September 2014.  |  Deploying SSL or TLS in a secure way is a great challenge for system administrators. This book aims to simplify that challenge by offering extensive knowledge and good advice - all in one place.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 15th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //