In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the last quarter of 2012, we announced the continuing decline in global messaging botnet infections as well as in former leaders Festi and Cutwail (see page 23).
In this blog, I will detail the evolution of the most representative botnet families that we have hunted since October 2010.
First we have dead and the dying. The dead include Bobax, Donbot, Grum, Fivetoone and Rustock; and those in poor health include Bagle:
- Bobax (alias Kraken) was with Bagle one of the first spam botnets. Different spammers used several variants from May 2004 to mid-2012.
- Donbot variants were frequently encountered from December 2008 to December 2011. They had their time of “glory” during the first quarter 2009, with a short revival in the second quarter of 2011. They are frequently merged with Trojan.Buzus (AVP in December 2007), TROJ_BUZUS (Trend in February 2008), and Win32/Bachsoy.A (Vet in August 2008).
- Grum (alias Win32/Tedroo) and its kernel-mode rootkit appeared in October 2007. Its control servers were taken down in July 2012.
- Fivetoone (alias DMSSpammer) began in October 2007, but disappeared in March 2012.
- Rustock (alias RKRustok, Costrat, Meredrop) appeared in 2006. It reached its peak between August and December 2010, but was stopped in February-March 2011 after law enforcement action.
- Unlike the previous five, Bagle is not fully defunct. This malware family appeared in January 2004. The variant we still watch is nicknamed Bagle-CB.
Second we have the survivors, present from 2010 to date. They are Festi, Cutwail, Lethic, and Maazben:
- Festi was first encountered in January 2009. It is now the most prevalent.
- Cutwail (alias Pandex, Wigon, Pushdo) appeared in September 2007. After a long time as number 1, it is now number 2.
- Lethic was discovered around September 2009. Shut down in January 2010, it reappeared not long afterward and is now in decline.
- Maazben appeared in May 2008. It is still in our top 5 but has dropped over three quarters from rank 3 to rank 5.
Finally we have the newcomers: Darkmailer, Waledac, Slenfbot, and Kelihos:
- Darkmailer is a spam tool first released in 2003. Each month for three years a small number of senders has been systematically detected by our sensors. In January 2013, we saw a dramatic increase in senders–suggesting a possible evolution in its spamming technique.
- Waledac (alias Waled, SLM) has been in the wild since October 2008. It was shut down for the first time in February 2010 (operation b49) but reappeared soon thereafter. It reached its highest level in 2012, but was recently affected when Polish authorities seized domains used to control the Virut botnet.
- Slenfbot is an IRC bot family known since 2008. Described in a Threat Advisory, a new variant has spread suddenly. It is distributed through links attached in different chat windows like ICQ, Skype, GTalk, Pidgin, AIM, MSN, and YIM, as well as Facebook.
- Controlled through a peer-to-peer network, Kelihos (alias Hilux) was first detected in December 2010, and appeared finished in September 2011. It reappeared during the last months of 2012, reaching rank 6.
The situation among messaging botnets is changing. Besides Festi and Cutwail, the challengers struggle is survive. Yet when a botnet fails or disappears, another one takes its place.
Original release date: March 08, 2013 | Last revised: March 12, 2013
Microsoft has released updates to address vulnerabilities in Microsoft Windows, Office, Internet Explorer, Silverlight, and Server Software as part of the Microsoft Security Bulletin summary for March 2013. These vulnerabilities could allow remote code execution, elevation of privilege, or information disclosure.
US-CERT encourages users and administrators to review the bulletin and follow best practice security policies to determine which updates should be applied.
This product is provided subject to this Notification and this Privacy & Use policy.