Pages: [1]   Go Down
  Print  
Author Topic: Article about Crimeware  (Read 1363 times)
gcerny12
Full Member
***
Posts: 104



« on: December 14, 2009, 07:00PM »

This came from one of my tech subscriptions at ZDNet. Thought you all might be interested.

Security researchers have intercepted a new variant of the Zeus crimeware, which is using Amazon’s EC2 services for command and control purposes of the botnet. The cybercriminals appear to be using Amazon’s RDS managed database hosting service as a backend alternative in case they loose access to the original domain, which would result in the complete loss of access to the compromised financial data obtained from the infected hosts.

Would 2010 be the year when crimeware will dive deep into the cloud, in an attempt to undermine the security industry’s take down operations? With the clear migration towards the abuse of legitimate infrastructure we’ve observed throughout the entire 2009, this may well be the case.


Despite the fact that this is the first publicly reported case of Zeus crimeware (Modern banker malware undermines two-factor authentication) campaign abusing Amazon’s cloud-based services, popular Web 2.0 services have also been under fire in recent months.

From the use of Twitter, to Google Groups and Facebook as command and control servers, these experiments clearly indicate that cybercriminals are cloud-aware, which isn’t surprising given that from a distributed computing perspective, some of biggest botnets currently online can easily top the Top 500 Supercomputing list.

What exactly are they trying to achieve, and isn’t the use of legitimate service for command and control purposes in fact a bad idea from a cybercriminal’s perspective, compared to a situation where they’ll be using the services of an ISP whose core competency lies in ignoring abuse notification and cooperation with the security industry and law enforcement in general?

It’s traffic camouflaging in the sense of making it harder to blacklist and detect potentially malicious activity hidden within the traffic stream between the infected host and a legitimate service.
Logged

My alter-ego when not listening to or watching CW. 
By Joe Palomine
Pages: [1]   Go Up
  Print  
 
Jump to: