Grum botnet

From HandWiki
Short description: Spam email botnet

The Grum botnet, also known by its alias Tedroo and Reddyb, was a botnet mostly involved in sending pharmaceutical spam e-mails.[1] Once the world's largest botnet, Grum can be traced back to as early as 2008.[2] At the time of its shutdown in July 2012, Grum was reportedly the world's third largest botnet,[3] responsible for 18% of worldwide spam traffic.[4][5]

Grum relies on two types of control servers for its operation. One type is used to push configuration updates to the infected computers, and the other is used to tell the botnet what spam emails to send.[6]

In July 2010, the Grum botnet consisted of an estimated 560,000–840,000 computers infected with the Grum rootkit.[7][8] The botnet alone delivered about 39.9 billion[9] spam messages in March 2010, equating to approximately 26% of the total global spam volume, temporarily making it the world's then-largest botnet.[10][11] Late in 2010, the botnet seemed to be growing, as its output increased roughly by 51% in comparison to its output in 2009 and early 2010.[12][13]

It used a panel written in PHP to control the botnet.[14]

Botnet takedown

In July 2012, a malware intelligence company published an analysis of the botnet's command and control servers located in the Netherlands, Panama, and Russia. It was later reported that the Dutch Colo/ISP soon after seized two secondary servers responsible for sending spam instructions after their existence was made public.[15] Within one day, the Panamanian ISP hosting one of Grum's primary servers followed suit and shut down their server.[16] The cybercriminals behind Grum quickly responded by sending instructions through six newly established servers in Ukraine.[17] FireEye connected with Spamhaus, CERT-GIB, and an anonymous researcher to shut down the remaining six C&C servers, officially knocking down the botnet.[17]

Grum botnet zombie clean-up

There was a sinkhole running on some of the former IP addresses of the Grumbot C&C servers. A feed from the sinkhole was processed via both Shadowserver and abusix to inform the Point of Contact at an ISP that has an infected IP addresses. ISP's are asked to contact their customers about the infections to have the malware cleaned up. Shadowserver.org will inform the users of their service once per day and Abusix sends out a X-ARF (extended version Abuse Reporting Format) report every hour.

See also

References

  1. "Grum". M86 Security. 2009-04-20. http://www.m86security.com/labs/spambotitem.asp?article=898. 
  2. Atif Mushtaq (2012-07-09). "Killing the Beast - Part 5". FireEye. http://blog.fireeye.com/research/2012/07/killing-the-beast-part-5.html. 
  3. Mushtaq, Atif (2012-07-18). "Grum, World's Third-Largest Botnet, Knocked Down | FireEye Blog". Fireeye.com. http://www.fireeye.com/blog/technical/botnet-activities-research/2012/07/grum-botnet-no-longer-safe-havens.html. 
  4. "Huge spam botnet Grum is taken out by security researchers". BBC News. 19 July 2012. https://www.bbc.com/news/technology-18898971. 
  5. "Researchers Say They Took Down World's Third-Largest Botnet". New York Times. 2012-07-18. http://bits.blogs.nytimes.com/2012/07/18/cybersecurity-researchers-say-they-took-down-worlds-third-largest-botnet/?src=twr. 
  6. "One of the world's largest spam botnets still alive after suffering significant blow". IDG. 2012-07-17. http://news.idg.no/cw/art.cfm?id=DA2D14C0-0D73-1D2B-F5A08C7983839E37. 
  7. "Research: Small DIY botnets prevalent in enterprise networks". ZDNet. http://www.zdnet.com/blog/security/research-small-diy-botnets-prevalent-in-enterprise-networks/4485. 
  8. "MessageLabs Blog - Evaluating Botnet Capacity". Messagelabs.com.sg. http://www.messagelabs.com.sg/resources/blog.aspx?link=http://www.symantec.com/connect/node/1029851. 
  9. "Which Botnet Is Worst? Report Offers New Perspective On Spam Growth - botnets/Security". DarkReading. 30 September 2009. http://www.darkreading.com/securityservices/security/perimeter/showArticle.jhtml?articleID=220300610. 
  10. "Grum and Rustock botnets drive spam to new levels". Securecomputing.net.au. 2010-03-02. http://www.securecomputing.net.au/News/168557,grum-and-rustock-botnets-drive-spam-to-new-levels.aspx. 
  11. Whitney, Lance (2010-03-02). "Botnets cause surge in February spam | Security - CNET News". News.cnet.com. http://news.cnet.com/8301-1009_3-10462103-83.html. 
  12. James Wray and Ulf Stabe (2010-03-01). "Spam volumes surge thanks Grum and Rustock botnets - Security". Thetechherald.com. http://www.thetechherald.com/article.php/201009/5308/Spam-volumes-surge-thanks-Grum-and-Rustock-botnets. 
  13. "MessageLabs: Botnets a threat to email marketing - Email Marketing". BizReport. 2009-09-30. http://www.bizreport.com/2009/09/messagelabs_botnets_a_threat_to_email_marketing.html. 
  14. Brian Krebs (2012-08-20). "Inside the Grum botnet". http://krebsonsecurity.com/2012/08/inside-the-grum-botnet/. 
  15. Steve Ragan (2012-07-17). "Dutch Police Takedown C&Cs Used by Grum Botnet". Security Week. http://www.securityweek.com/dutch-police-takedown-ccs-used-grum-botnet. 
  16. Alex Fitzgerald (2012-07-19). "Botnet Responsible for 18% of World's Spam Knocked Offline". Mashable. http://mashable.com/2012/07/19/spam-botnet-taken-down/. 
  17. 17.0 17.1 Atif Mushtaq (2012-07-19). "Grum, World's Third-Largest Botnet, Knocked Down". FireEye. https://www.fireeye.com/blog/threat-research/2012/07/grum-botnet-no-longer-safe-havens.html.