{"id":1875,"date":"2010-01-21T21:13:12","date_gmt":"2010-01-22T02:13:12","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=1875"},"modified":"2022-12-30T12:39:21","modified_gmt":"2022-12-30T17:39:21","slug":"spam-decline","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/spam-decline\/","title":{"rendered":"SPAM Decline?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-101571\" title=\"SPAM Decline?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spam_email-reject-1.jpg?resize=110%2C110&#038;ssl=1\" alt=\"SPAM Decline?\" width=\"110\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spam_email-reject-1.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spam_email-reject-1.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spam_email-reject-1.jpg?w=237&amp;ssl=1 237w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/>\u00a0<em><a href=\"https:\/\/www.pcworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">PC World<\/a><\/em> <a href=\"https:\/\/web.archive.org\/web\/20120902093036\/http:\/\/www.pcworld.com:80\/article\/185122\/good_guys_bring_down_the_megad_botnet.html\" target=\"_blank\" rel=\"noopener noreferrer\">chronicles<\/a> how analysts at the California-based security company <strong><a href=\"https:\/\/www.fireeye.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FireEye<\/a><\/strong> executed a plan to <strong>shut down the Mega-D botnet<\/strong> in early November 2009. At one point the Mega-D botnet <a href=\"http:\/\/web.archive.org\/web\/20101003091118\/http:\/\/www.securecomputing.net.au:80\/News\/102413,megad-botnet-stronger-than-storm-promotes-male-sexual-pills.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">reportedly<\/a> accounted for <strong>32 percent of all spam<\/strong>. In order to shut down this threat, Afit Mushtaq and two FireEye colleagues went after Mega-D&#8217;s command infrastructure.<\/p>\n<p><a href=\"https:\/\/www.fireeye.com\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-101574\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fireeye_logo.gif?resize=150%2C59&#038;ssl=1\" alt=\"\" width=\"150\" height=\"59\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fireeye_logo.gif?resize=150%2C59&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fireeye_logo.gif?resize=75%2C30&amp;ssl=1 75w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>According to the article, the botnet&#8217;s command infrastructure was its weak point. The Mega-D malware infecting PCs was directed from <strong>online command and control (C&amp;C) servers<\/strong> throughout the world. If the bots could be separated from their controllers, the researchers found that the undirected bots would sit idle on the PC&#8217;s not delivering their malware. Mushtaq found that every Mega-D bot had been assigned a list of other destinations to try if it couldn&#8217;t reach its primary command server. So taking down Mega-D would need a <strong>carefully coordinated attack.<\/strong><\/p>\n<p>To set up the coordinated attack the FireEye team first contacted <strong>Internet Service Providers (ISP&#8217;s) that hosted Mega-D control servers.<\/strong> Mushtaq&#8217;s <a href=\"https:\/\/blog.fireeye.com\/research\/2009\/11\/killing-the-beastpart-4.html\" target=\"_blank\" rel=\"noopener noreferrer\">research<\/a> showed that most of the Mega-D C&amp;C servers were based in the United States, with one in Turkey and another in Israel. The FireEye team received cooperation for the U.S.-based IPS&#8217;s but not the overseas ISPs. The Mushtaq team took down the U.S.-based C&amp;C servers.<\/p>\n<p>Since the ISP&#8217;s in Israel and Turkey refused to cooperate, <em>PC World<\/em> reports that Mushtaq and company contacted <strong>domain-name registrars<\/strong> holding records for the domain names that Mega-D used for its control servers. The registrars collaborated with FireEye to <strong>point Mega-D&#8217;s existing domain names to nowhere<\/strong>. This cut off the botnet&#8217;s pool of domain names that bots would use to reach Mega-D-affiliated C&amp;C servers overseas ISPs.<\/p>\n<p>As the last step, <em>PC World<\/em> says that FireEye and the registrars worked to claim spare domain names that Mega-D&#8217;s controllers listed in the bots&#8217; programming and pointed them to<strong> &#8220;sinkholes&#8221;<\/strong> (servers FireEye had set up to sit quietly and log efforts by Mega-D bots to check-in for orders). Using those logs, FireEye estimated that the botnet consisted of about 250,000 Mega-D-infected computers.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-101575\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/messagelabs_logo-1.jpg?resize=82%2C75&#038;ssl=1\" alt=\"\" width=\"82\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/messagelabs_logo-1.jpg?w=82&amp;ssl=1 82w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/messagelabs_logo-1.jpg?resize=75%2C69&amp;ssl=1 75w\" sizes=\"auto, (max-width: 82px) 100vw, 82px\" \/><a href=\"https:\/\/www.crn.com\/news\/security\/210800531\/symantec-to-acquire-messagelabs.htm\" target=\"_blank\" rel=\"noopener noreferrer\">MessageLabs<\/a> <a href=\"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=2f55c87d-020e-465b-95c6-812b4e465cca&amp;CommunityKey=f5d62f53-a337-4805-842f-e5bc06329b21&amp;tab=librarydocuments\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that Mega-D had &#8220;consistently been in the top 10 spam bots&#8221; for the previous year. The botnet&#8217;s output fluctuated from day to day, but on November 1 Mega-D accounted for 11.8 percent of all spam that MessageLabs saw. After, FireEye&#8217;s action Mega-D&#8217;s market share of Internet spam to less than 0.1 percent, MessageLabs says.<\/p>\n<p>Mushtaq recognizes that FireEye&#8217;s successful offensive against Mega-D was <strong>just one battle in the war on malware<\/strong>. The criminals behind Mega-D may try to revive their botnet, he says, or they may abandon it and create a new one. But other botnets continue to thrive. &#8220;<em>FireEye did have a major victory<\/em>,&#8221; says Joe Stewart, director of malware research with <a href=\"https:\/\/www.secureworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SecureWorks<\/a> in the<em> PC World<\/em> article, &#8220;<em>The question is, will it have a long-term impact?<\/em>&#8221;<\/p>\n<p>Mushtaq says that FireEye is sharing its method with domestic and international law enforcement, and he&#8217;s hopeful. Until that happens, &#8220;we&#8217;re definitely looking to do this again,&#8221; Mushtaq says. &#8220;We want to show the bad guys that we&#8217;re not sleeping.&#8221;<\/p>\n<p><strong><em>Rb-<\/em><\/strong><\/p>\n<p><em>The Daily Average SPAM Received (DASR) index reached an all-time low in December 2009. The DASR for December 2009 was 29.4. The trend was on the decline since its all-time high in May 2008 of 77.5, but this seems different.<\/em><\/p>\n<p><em>The impacts of the Fire-Eye operations seem longer lasting. The DASR stayed down through December and into the New Year. The month-to-date DASR index for January 2010 is a paltry 15. <\/em><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-101577\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/DASR2009-1.gif?resize=398%2C263&#038;ssl=1\" alt=\"\" width=\"398\" height=\"263\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/DASR2009-1.gif?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/DASR2009-1.gif?resize=75%2C50&amp;ssl=1 75w\" sizes=\"auto, (max-width: 398px) 100vw, 398px\" \/><\/p>\n<p><em>Even after the <a href=\"https:\/\/web.archive.org\/web\/20220331215650\/http:\/\/voices.washingtonpost.com\/securityfix\/2008\/11\/major_source_of_online_scams_a.html\" target=\"_blank\" rel=\"noopener noreferrer\">McColo takedown<\/a> in November 2008, the DASR never reached this low level.\u00a0 Hopefully, Spammers have seen the error in their ways, repented, and found something else to do, but more likely is they have reloaded with new ammo as they exploit <a href=\"https:\/\/www.symantec.com\/connect\/blogs\/users-social-networking-websites-face-malware-and-phishing-attacks\" target=\"_blank\" rel=\"noopener noreferrer\">social networks<\/a>, Adobe, <a href=\"https:\/\/news.bbc.co.uk\/2\/hi\/technology\/8460819.stm\" target=\"_blank\" rel=\"noopener noreferrer\">IE<\/a>, and <a href=\"https:\/\/www.guardian.co.uk\/technology\/2010\/jan\/14\/google-yahoo-china-cyber-attack\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a>.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.ibtimes.com\/your-browser-history-private-resolution-would-allow-isps-collect-information-2493396\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Is Your Browser History Private? Resolution Would Allow ISPs To Collect Information From Customers Without Permission<\/a> (ibtimes.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security firm FireEye shut down the command and control servers for the Mega-D botnet in 2009 stopping nearly on third of all SPAM<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3240,58,118,23,119,4,95],"class_list":["post-1875","post","type-post","status-publish","format-standard","hentry","category-security","tag-3240","tag-botnet","tag-fireeye","tag-malware","tag-mega-d","tag-security","tag-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1875"}],"version-history":[{"count":16,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1875\/revisions"}],"predecessor-version":[{"id":124212,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1875\/revisions\/124212"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}