{"id":1693,"date":"2010-08-16T22:44:39","date_gmt":"2010-08-17T02:44:39","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=1693"},"modified":"2022-12-30T15:28:09","modified_gmt":"2022-12-30T20:28:09","slug":"2009-spam-results","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/2009-spam-results\/","title":{"rendered":"2009 SPAM results"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1744 size-full\" style=\"border: 0pt none; margin: 2px;\" title=\"2009 SPAM results\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/malware-e1561317393416.jpg?resize=116%2C101&#038;ssl=1\" alt=\"2009 SPAM results\" width=\"116\" height=\"101\" \/> <a href=\"https:\/\/www.pcworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>PC World<\/em><\/a> <a href=\"https:\/\/web.archive.org\/web\/20120902093036\/http:\/\/www.pcworld.com:80\/article\/185122\/good_guys_bring_down_the_megad_botnet.html\" target=\"_blank\" rel=\"noopener noreferrer\">chronicles<\/a> how analysts at the a California-based security company <a href=\"https:\/\/www.fireeye.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FireEye<\/a> executed a plan to shut down the Mega-D (or Ozdok) botnet in early November 2009. At one point the <a class=\"zem_slink\" title=\"Mega-D botnet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mega-D_botnet\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Mega-D botnet<\/a> <a href=\"http:\/\/web.archive.org\/web\/20101003091118\/http:\/\/www.securecomputing.net.au:80\/News\/102413,megad-botnet-stronger-than-storm-promotes-male-sexual-pills.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">reportedly<\/a> accounted for 32 percent of all spam. In order to shut down this threat, Afit Mushtaq and two FireEye colleagues went after Mega-D&#8217;s command infrastructure.<\/p>\n<p><a href=\"https:\/\/www.fireeye.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1746\" style=\"border: 0pt none; margin: 2px;\" title=\"fireeye\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/fireeye.gif?resize=99%2C39&#038;ssl=1\" alt=\"\" width=\"99\" height=\"39\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/fireeye.gif?w=200&amp;ssl=1 200w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/fireeye.gif?resize=150%2C59&amp;ssl=1 150w\" sizes=\"auto, (max-width: 99px) 100vw, 99px\" \/><\/a>According to the article, the botnet&#8217;s command infrastructure was its weak point. The Mega-D owned bots infesting PCs were directed from online command and control (C&amp;C) servers throughout the world. If the bots could be separated from their controllers, the researchers found that the undirected bots would sit idle on the PC&#8217;s not delivering their malware. Mushtaq found that every Mega-D bot had been assigned a list of destinations to try if it couldn&#8217;t reach its primary command server.\u00a0 Taking down Mega-D would need a carefully coordinated attack.<\/p>\n<p>To coordinate the attach the FireEye team contacted the Internet Service Providers (ISP&#8217;s) that hosted Mega-D control servers. Mushtaq&#8217;s <a href=\"https:\/\/blog.fireeye.com\/research\/2009\/11\/killing-the-beastpart-4.html\" target=\"_blank\" rel=\"noopener noreferrer\">research<\/a> showed that most of the Mega-D C&amp;C servers were based in the United States, with others in Turkey and Israel. The FireEye team received cooperation for the U.S.-based IPS&#8217;s but not the overseas ISPs. The FireEye team took down the U.S.-based C&amp;C servers.<\/p>\n<p>Since the ISP&#8217;s in Israel and Turkey refused to cooperate, PC World reports that Mushtaq and company contacted domain-name registrars holding records for the domain names that Mega-D used for its control servers. The registrars collaborated with FireEye to point Mega-D&#8217;s existing domain names to no\u00ad\u00adwhere. This cut off the botnet&#8217;s pool of domain names that the bots would use to reach the overseas ISP-based Mega-D C&amp;C servers.<\/p>\n<p>As the last step, <em>PC World<\/em> says that FireEye and the registrars worked to claim spare domain names that Mega-D&#8217;s controllers listed in the bots&#8217; programming and pointed them to &#8220;sinkholes&#8221; (servers FireEye had set up to sit quietly and log efforts by Mega-D bots to check-in for orders). Using those logs, FireEye estimated that the botnet consisted of about 250,000 Mega-D-infected computers.<\/p>\n<p><a href=\"https:\/\/www.crn.com\/news\/security\/210800531\/symantec-to-acquire-messagelabs.htm\" target=\"_blank\" rel=\"noopener noreferrer\">MessageLabs<\/a> <a href=\"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=2f55c87d-020e-465b-95c6-812b4e465cca&amp;CommunityKey=f5d62f53-a337-4805-842f-e5bc06329b21&amp;tab=librarydocuments\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that Mega-D had &#8220;consistently been in the top 10 spam bots&#8221; for the earlier year. The botnet&#8217;s output fluctuated from day to day, but on November 1 Mega-D accounted for 11.8 percent of all spam that MessageLabs saw. Three days after FireEye&#8217;s operation, Mega-D&#8217;s share of Internet spam to less than 0.1 percent, MessageLabs states.<\/p>\n<p>Mushtaq recognizes that FireEye&#8217;s successful offensive against Mega-D was just one battle in the war on malware. The criminals behind Mega-D may try to revive their botnet, he says, or they may abandon it and create a new one. But other botnets continue to thrive. &#8220;FireEye did have a major victory,&#8221; says Joe Stewart, director of malware research with <a href=\"https:\/\/www.secureworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SecureWorks<\/a> in the <em>PC World<\/em> article, &#8220;The question is, will it have a long-term impact?&#8221;<\/p>\n<p>Mushtaq says that FireEye is sharing its method with domestic and international law enforcement,\u00a0 &#8220;we&#8217;re definitely looking to do this again,&#8221; Mushtaq says. &#8220;We want to show the bad guys that we&#8217;re not sleeping.&#8221;<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The takedown of Mega-D by FireEye has had a noted decrease in the level of SPAM I observed. During the 10 months before the Mega-D takedown, the daily average of SPAM messages (DASM) received 49. After the November 2009 takedown, the DASM rate dropped to 33. A step down into the numbers reveals that the November 2009 DASM was 35 and the December DASM was 29.<\/em><\/p>\n<p style=\"text-align: center;\"><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1752 aligncenter\" style=\"border: 0pt none;\" title=\"2009_spam\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/2009_spam.gif?resize=284%2C187&#038;ssl=1\" alt=\"\" width=\"284\" height=\"187\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/2009_spam.gif?resize=300%2C198&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/2009_spam.gif?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/2009_spam.gif?w=622&amp;ssl=1 622w\" sizes=\"auto, (max-width: 284px) 100vw, 284px\" \/><br \/>\n<\/em><\/p>\n<p><em><a href=\"http:\/\/www.shadowserver.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1749 size-medium alignright\" style=\"border: 0pt none; margin-left: 2px; margin-right: 2px;\" title=\"shadowServer\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/shadowServer.png?resize=150%2C34&#038;ssl=1\" alt=\"\" width=\"150\" height=\"34\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/shadowServer.png?resize=300%2C67&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/shadowServer.png?resize=150%2C33&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/shadowServer.png?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>The overall DASM trend line for 2009 was down. In order to keep the trend going down, firms should investigate the <a title=\"Shadowserver\" href=\"http:\/\/blog.shadowserver.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Shadowserver<\/a> &#8211; <a href=\"http:\/\/www.shadowserver.org\/wiki\/pmwiki.php\/Involve\/GetReportsOnYourNetwork\" target=\"_blank\" rel=\"noopener noreferrer\">ASN &amp; Netblock Alerting &amp; Reporting Service<\/a>. This free reporting service is designed for organizations that directly own or control network space. The service provides reports detailing detected malicious activity to aid in their detection and mitigation program.\u00a0 Shadowserver has provided this service for over two years and now generates over 4,000 reports nightly.\u00a0 The reporting service monitors and alerts the following activity:<\/em><\/p>\n<ul>\n<li><em>Detected Botnet Command and Control servers<\/em><\/li>\n<li><em>Infected systems (drones)<\/em><\/li>\n<li><em><a class=\"zem_slink\" title=\"Denial-of-service attack\" href=\"http:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">DDoS attacks<\/a> (source and victim)<\/em><\/li>\n<li><em>Scans<\/em><\/li>\n<li><em>Clickfraud<\/em><\/li>\n<li><em>Compromised hosts<\/em><\/li>\n<li><em>Proxies<\/em><\/li>\n<li><em>Spam relays<\/em><\/li>\n<li><em><a class=\"zem_slink\" title=\"Malware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Malicious software<\/a> droppers and other related information.<\/em><\/li>\n<\/ul>\n<p><em>Detected malicious activity on a subscriber&#8217;s network is flagged and included in daily summary reports detailing the previous 24 hours of activity. These customized reports are made freely available to the responsible network operators as a subscription service.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/wp.me\/P2wgaW-3H\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a href=\"https:\/\/www.linkedin.com\/in\/rb48334\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 2009 takedown of the Mega-D botnet by FireEye noticeably dropped the level of SPAM &#8211; the daily average of SPAM messages dropped from 49 to 33<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3240,58,118,597,119,2306,4,95],"class_list":["post-1693","post","type-post","status-publish","format-standard","hentry","category-security","tag-3240","tag-botnet","tag-fireeye","tag-internet-service-provider","tag-mega-d","tag-net-neutrality","tag-security","tag-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1693"}],"version-history":[{"count":9,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1693\/revisions"}],"predecessor-version":[{"id":124004,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1693\/revisions\/124004"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}