Microsoft applies 'surgical sinkhole' to strangle botnet installed on new PCs
Uncovers out-of-the-box Chinese machines infected with 'Nitol,' uses new DNS sinkhole strategy to kill botnet's comm links
Computerworld - Microsoft has uncovered a vulnerability in the PC supply chain that allows hackers to pre-install malware-infected copies of Windows onto new machines.
As a result, the company has received approval from a federal court to strangle a botnet it uncovered during the investigation, which it conducted in China.
The company announced on Thursday that it was diverting traffic from the 3322.org domain to its own DNS (domain name system) servers to selectively block communications from PCs infected with the "Nitol" botnet to the hackers' command-and-control (C&C) machines.
It's also blocking access to approximately 70,000 malware-plagued subdomains of 3322.org, a Chinese web hosting firm. Other subdomains of 3322.org are resolving normally for users.
The tactic, called "sinkholing," isn't new to Microsoft's anti-malware efforts -- it's sinkholed other botnets -- most recently in March, when it disrupted networks that relied on the Zeus crimeware toolkit -- but a new twist lets it block the bad on 3322.org while letting the good through.
"We're always concerned about collateral damage," said Richard Boscovich, a senior attorney in Microsoft's digital crimes unit, in an interview yesterday. "3322.org has between 2.5 and 2.75 million subdomains, but only the 70,000 malicious subdomains will be sinkholed. The remaining will resolve."
Most sinkholing efforts divert all traffic from a malicious domain, blocking access for everyone.
Redwood City, Calif.-based Nominum provided technical assistance and its DNS software to the operation, which Microsoft has dubbed "b70."
"This was a surgical strike," said Craig Sprosts, Nominum's general manager for fixed broadband solutions, in an interview today. "Microsoft took ownership of the [3322.org] domain and basically created a more surgical access to the good domains and blocked the bad."
The problem posed by the sinkholing of 3322.org, with its millions of subdomains, was technically difficult, said Sprosts and a college, Daniel Blasingame, general manager for embedded solutions at Nominum.
"Microsoft needs to be able to change the list of the good and bad subdomains on the fly," said Blasingame, who cited that as well as the sheer scale of the project as factors complicating the operation.
All DNS traffic between users and the 3322.org domain and its subdomains now flows through Nominum servers installed at Microsoft's data centers, confirmed Sprosts.
"Microsoft has told us that this is literally the biggest botnet it's dealt with," said Blasingame, talking about the amount of sinkholed traffic Microsoft is now dealing with. "They've said it's a massive amount of DNS traffic."
Microsoft's take on 3322.org is unclear. In a complaint filed on Sept. 10 with a Virginia federal court, Microsoft called the domain a "major hub of illegal Internet activity, used by criminals every minute of every day to pump malware and instructions to the computers of innocent people world-wide."
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts