text
stringlengths 4
429
|
---|
commonly associated with new and amateur botnet operators |
2. There were several CnC domains were identified based upon key characteristics of the |
registration and management of the previously publicly disclosed CnC domains. |
3. The major pattern of attacks in mid-December appear to have their origin in July 2009 in |
mainland China. This likely corresponds to early testing of the botnet CnC. |
4. Some of the infections appeared to start within Google |
s network. Some of apparent botnet |
the traffic is not consistent with an IE6/WinXP infection and cannot be easily explained. |
5. The attackers had access to large numbers of CnC hosts in geographically diverse hosting colocations |
certainly a high number for a botnet. Further, the botnet used over a dozen |
domains in diverse DDNS networks for CnC. |
6. Only the US victims were compelled to perform MX queries, an event that would typically |
indicate attempted document exfiltration via email services. |
7. Some of the botnets focused on victims outside of Google, suggesting that each domain |
might have been dedicated to a distinct class or vertical of victims. |
8. A review of the TTL period suggests that botmasters de-registered their domains around |
December 18, 2009. |
Passive DNS Data Summary |
Based upon analysis of DNS resolution data gathered through a global network of passive DNS |
monitoring sensors, the key findings are as follows: |
1. Cumulative volume of CnC domain name resolutions provides adequate sampling to identify |
the initialization and growth phases of the Aurora botnet, which also reveals active operation |
of the CnC channels dating back to June 14th 2009. |
2. The victim |
s computers connected to, or were part of, 64 different networks, based upon |
Autonomous Systems (AS) breakdown of Internet netblocks which could represent the upper |
bound of organizations that may have been breached in the larger Aurora attack. Some |
organizations (such as Google) own and manage several AS networks. Some of the other AS |
networks were associated with public Internet Service Providers, which may encompass |
multiple small and medium businesses. |
Page 27 |
The Command Structure of the Aurora Botnet |
3. The various CnC domains used by the criminal botnet operators peaked at different times with |
different rates of lookup by victim systems. These observations correspond to different |
campaigns run in parallel by different botnet operators and represent the widely publicized |
attacks that appeared to make use of the Internet Explorer 6 Zero-Day exploit. It is a common |
tactic by botnet operators to run multiple campaigns at the same time, using different |
infection vectors (e.g. drive-by downloads, FakeAV, USB infections, etc.) over extended periods |
of time. This strategy is very consistent with APT campaign methodologies. |
4. The vast majority of victim systems appear to have been based in the United States. |
5. It is possible to identify the various CnC testing, deployment, management and shutdown |
phases of the Aurora botnet CnC channels. Some of the CnC domains appear to have been |
dormant for a period of time after they had infected number victim systems. This type of |
activity can sometimes be associated with an update to the botnet malware or if the criminal |
operator sells/trades a segment of the botnet to another criminal operator. |
Malware Analysis Summary |
Damballa has an array of sources for obtaining new and Zero-Day malware that range from |
commercial security sharing programs and spam traps to samples gathered from within its enterprise |
customers |
networks. By automatically analyzing tens-of-thousands of new and unique samples each |
day and extracting their CnC behaviors, Damballa can cluster these malware variants with different |
botnets. Based upon our analysis of malware samples that relied upon the Aurora CnC domains, our |
key findings are as follows: |
1. The botnet operators behind the Google Aurora attacks deployed other malware families prior |
to the Trojan.Hydraq release. Some of these releases overlapped with each other. |
2. Two additional families of malware (and their evolutionary variants) were identified as |
Fake AV |
Alert / Scareware |
Login Software 2009 |
and |
Fake Microsoft Antispyware Service |
both of |
which were deployed using fake antivirus infection messages to socially engineering the |
victim into installing the malicious botnet agents. |
3. By tracking the evolution of the malware, Damballa was able to identify additional botnet CnC |
domains used by the criminal operators and establish a timeline of malware associations |
going back to May 2nd 2009, based upon when a malware sample was captured within an |
enterprise customer network. |
4. Over the time period of this study, the botnet operators improved upon the malware they |
were deploying. The relative sophistication and armoring of the malware families grow over |
the months the operators were deploying it, and when they transitioned to entirely new |
malware families. |
5. The major malware families associated with the Aurora botnet attacks are distinct and are |
unlikely to have been developed by the same malware engineer. This finding is typical of the |
botnets that Damballa observes targeting enterprise networks. Relatively few botnet criminal |
operators develop and maintain their own malware. Instead, they typically rely upon thirdparty contractors or off-the-shelf malware construction kits. As such, core features and |
functionality changes can occur overnight, but the CnC transitions slowly as the botnet |
operator ensures that backup CnC domains remain in operation until the victim malware |
updates (or migration) is complete. |
Page 28 |
The Command Structure of the Aurora Botnet |
Conclusions |
Damballa |
s findings concerning Operation Aurora can be summarized by the following: |
At the time the attack was first noticed by Google in December 2009, systems within at least 7 |
countries had already been affected. By the time Google made the public disclosure of the attack |
on January 12 2010, systems in over 22 countries had been affected and were attempting to |
contact the CnC servers - the top five countries being the United States, China, Germany, Taiwan |
and the United Kingdom. |
The Trojan.Hydraq malware, which has been previously identified as the primary malware used by |
the attackers, is actually a later staging of a series of malware used in the attacks which consisted |
of at least three different malware |
families |
. Two additional families of malware (and their |
evolutionary variants) have been identified, and they were deployed using fake antivirus infection |
messages tricking the victim into installing the malicious botnet agents. |
The attacks that eventually targeted Google can be traced back to July 2009, with what appears to |
be the first testing of the botnet by its criminal operators. The analysis identifies the various CnC |
testing, deployment, management and shutdown phases of the botnet CnC channels. |
The botnets used dozens of domains in diverse Dynamic DNS networks for CnC. Some of the |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.