Welcome, Guest. Please login or register.

Author Topic: Spam Bounces Back  (Read 1553 times)

0 Members and 1 Guest are viewing this topic.

Deez

  • Administrator
  • Hero Member
  • *****
  • Posts: 10689
  • Karma: 1871
    • View Profile
    • Qwoter
Spam Bounces Back
« on: December 10, 2008, 05:09:14 PM »
Four weeks after spam levels plummeted when a rogue hosting company was yanked off the Internet, junk mail volumes are again up, a researcher said Tuesday.

According to IronPort Systems Inc., spam volumes have partially recovered since the Nov. 11 takedown of McColo Corp., the California hosting firm that was pulled off the Web by its upstream service providers after security researchers presented them with overwhelming evidence that it was harboring a wide range of criminal activity. Among McColo's clients: cybercriminal groups that ran some of the biggest spam-spewing and malware-spreading botnets in the world.

Monday, approximately 94.6 billion spam messages were sent worldwide, said IronPort, which estimated Tuesday's volume at 96.8 billion. Those numbers were 62% and 63%, respectively, of the 153 billion sent four weeks ago, the day McColo went offline.

Immediately after the takedown, spam levels dropped to 64.1 billion, just 42% of the pre-McColo volume.

Spam's resurgence comes courtesy of several botnets -- some well-known, some not -- that were largely unaffected by McColo's disappearance, said Joe Stewart, director of malware research at SecureWorks Inc.

First of all, reports that the "Srizbi" and "Rustock" botnets have been resurrected are "mostly untrue," said Joe Stewart. "These botnets are not monolithic, especially Srizbi, which is in the hands of a lot of people. Each has a couple of variants [of the bot Trojan], and maybe a few thousand bots. Some have regained control of their botnets, some have not."

In fact, Srizbi and Rustock -- which were the world's largest and third-largest botnets, respectively, before Nov. 11 -- have effectively faded into the background. "It's looking like these botnet spam providers have had their customers jump ship," said Stewart.

Other botnets have stepped up to take their place.

"'Mega-D' has come back to its original strength," Stewart said, referring to another botnet that had been controlled by McColo-hosted servers. "'Cutwail' is running strong, and so is 'Kraken.' Botnets that weren't badly affected [by McColo going offline] seem to have picked up customers."

Other researchers have recently reported Mega-D's restoration. London-based Marshal8e6, for example, said yesterday that Mega-D's controllers have set up new command servers, re-established links with their compromised PCs and have resumed spamming.

The criminals who ran Srizbi and Rustock have had far less success, said SecureWorks' Stewart. "Everyone fully expected Srizbi to come back," he noted, although that's not happened. Srizbi's controllers were stymied for a while by FireEye Inc., which for a time was registering the domain names the bots would use to reconnect with new command servers. FireEye, however, was unable to finance the tactic indefinitely, and stopped.

"We're seeing Srizbi bots that are asking for [routing] domain names that aren't registered to anyone," said Stewart. He was unable to explain why the hackers had walked away from their botnets, but speculated that it was a business decision.

"The longer they left it, the more the botnet diminished," he said, noting that botnets continually lose machines as PCs are cleaned of the malware or taken out of service and replaced by new systems. "They have to make a decision, is it worth it to regain control or just build a new botnet?"

In the meantime, once-smaller players have grown in size as spammers turned to new providers. "'Xarvester' is one," said Stewart, "that has seemed to pick up a lot of traffic. It's somewhere between Mega-D and Cutwail in size, so it's moved into the top three with at least 130,000 bots."

Xarvester and another botnet, which Stewart has dubbed "Gahg," are spamming some of the same types of messages that once came from bots controlled by Srizbi's and Rustock's herders, he added.

"There aren't any new botnets, not so far," Stewart continued. But he warned that the criminals responsible for Srizbi and Rustock could very well be working on new malware and spreading it on vulnerable PCs. "That could be one reason why they haven't restored the [downed] bots, they could be in development right now."
  • Favorite Stocks: GOOG
Qwoter Stock College" style="border:0

Tags:
 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Warning: this topic has not been posted in for at least 350 days.
Unless you're sure you want to reply, please consider starting a new topic.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
What color is the Qwoter logo?:

What year was Qwoter founded in?
(hint: look at copyright below):

Related Topics

  Subject / Started by Replies Last post
0 Replies
2852 Views
Last post January 23, 2007, 11:40:01 AM
by The Web Team
0 Replies
1820 Views
Last post October 14, 2007, 10:00:22 AM
by Deez
0 Replies
1367 Views
Last post November 05, 2007, 05:00:30 AM
by Deez
1 Replies
2021 Views
Last post December 04, 2007, 05:19:49 PM
by Investor_Gadget
0 Replies
3563 Views
Last post December 08, 2007, 11:00:51 AM
by Deez
0 Replies
3475 Views
Last post December 10, 2007, 08:52:17 AM
by The Web Team
0 Replies
1436 Views
Last post December 27, 2007, 03:00:19 PM
by Deez
0 Replies
1918 Views
Last post January 21, 2008, 08:00:24 PM
by Deez
0 Replies
1570 Views
Last post June 30, 2009, 01:01:04 PM
by Stock Spam
0 Replies
1625 Views
Last post December 15, 2009, 08:01:06 AM
by Stock Spam