Update: Attacks on Google may have been work of amateurs
Security firm says the attacks may not have been nearly as sophisticated as some thought
Computerworld - Contrary to popular assumptions, the recent cyberattacks against Google and more than 30 other high-tech companies were carried out by relatively unsophisticated attackers using outdated botnet tools, according to Damballa Inc., an Atlanta-based security firm.
The company, which offers a range of botnet protection services, released a report Tuesday based on what it said was a detailed analysis of the data surrounding the attacks, the malware that was used and the command-and-control topologies used by the perpetrators.
It reveals that the threat can "best be classified as just another common botnet attack and one that is more amateur than average," the Damballa report noted. "The attack is most notable not for its advanced use of an Internet Explorer 6 Zero-Day exploit, but rather for its unsophisticated design and a pedigree that points to a fast-learning but nevertheless amateur criminal botnet team," the report said.
Google in December disclosed that it had been the victim of a targeted cyberattack designed to steal intellectual property, e-mail and other data from the company. It said the attacks appeared to originate from China and also affected many other high-tech companies.
In an e-mailed comment, a Google spokesman said that Damballa does not have any firsthand knowledge of Google's investigation of the attacks. "Beyond that, we are not going to comment on our ongoing investigation. We stand behind our original statement," he said.
The attacks, dubbed Operation Aurora after the botnet that was used to launch them, were described by Google and many in the industry as being particularly sophisticated and state-sponsored. Some called it a classic example of a new category of Advanced Persistent Threats (APT) facing many commercial enterprises.
According to Damballa, however, the actual attack data suggests otherwise. The Dynamic DNS (DDNS) command-and-control system that was used to control the Aurora botnet for instance, is "old school" and is rarely used today by professional criminal botnet operators. The reliance on a DDNS command-and-control infrastructure suggests that those behind the Google attacks were "new and amateur botnet operators," Damballa said.
The malware tool most commonly associated with the Aurora botnet is also a relatively unsophisticated Trojan Horse program called Trojan.Hydraq, said Gunter Ollmann, vice president of research at Damballa. In addition to Hydraq, the attackers also employed a variety of other malware tools on the Aurora botnet, many of which were unsophisticated and based on old obfuscation and evasion techniques, Ollmann said.
Compared to malware tools such as Conficker, the malware that was used in the Google attacks was "orders of magnitude" less potent, he said.
What the data shows is that the Google attacks were most likely carried out by relatively inexperienced attackers who were experimenting with different attack tools and techniques, Olmmann said. The fact that they were relying on DDNS itself is a major giveaway, he said. Botnets that use DDNS services are relatively easily for law enforcement authorities to shut down, which is why most professional botnet operators don't use them anymore.
Web giants attacked
- White House orders security review in wake of WikiLeaks disclosure
- Leaked U.S. document links China to Google attack
- Update: Researchers track cyber-espionage ring to China
- Google, China now playing cat and mouse?
- McAfee: 'Amateur' malware not used in Google attacks
- Military warns of 'increasingly active' cyber-threat from China
- China: Google 'totally wrong' to stop censoring
- Update: Google stops censoring in China
- Google's China ad partners wait in 'incomparable pain'
- Google may soon leave China, reports say
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts