{"id":413,"date":"2013-05-15T00:00:00","date_gmt":"2013-05-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/15\/malware-behind-oldest-most-active-spam-botnet-gets-refresh\/"},"modified":"2021-12-30T11:37:16","modified_gmt":"2021-12-30T11:37:16","slug":"malware-behind-oldest-most-active-spam-botnet-gets-refresh","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/15\/malware-behind-oldest-most-active-spam-botnet-gets-refresh\/","title":{"rendered":"Malware Behind Oldest, Most Active Spam Botnet Gets Refresh"},"content":{"rendered":"<p>One of the largest and most notorious spam botnets, known for sending out millions of spam messages every day, has gotten a new communications mechanism that makes it more resilient to take downs, according to security researchers&#8217; analysis. A team of security experts from Dell (NSDQ:Dell) SecureWorks, Damballa Labs and the Georgia Institute of Technology have discovered a new domain name generation algorithm that is part of the Pushdo malware&#8217;s back-up command-and-control mechanism. The report, issued by Damballa and Dell SecureWorks, found the malware associated with Pushdo can evade both intrusion detection and prevention systems as well as most antimalware technologies by mimicking legitimate connection attempts to benign websites to confuse signature-based systems.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;This latest version has a fall-back C&amp;C mechanism that is based upon a domain name generation algorithm (DGA),&#8221; wrote Manos Antonakakis, Damballa&#8217;s Chief Scientist and lead researcher on the report, issued Wednesday. &#8220;If the malware cannot successfully resolve any of the domains that are hard coded into it, it will start using the DGA in an effort to connect to the currently active DGA C&amp;C.&#8221;<\/p>\n<p>Researchers at antibotnet vendor Damballa Labs performed malware analysis on the new Pushdo variant and monitored several of the domains generated by the new domain algorithm to measure the scope of the new threat.<\/p>\n<p>The latest domain generation algorithm technique is a backup, only used if the malware on an infected machine fails to connect with the primary command-and-control server.<\/p>\n<p>&#8220;This is a very smart way to defeat generic network signature and sandboxing systems that simply block the network communication observed during the dynamic analysis of the malicious binary,&#8221; the researchers said<\/p>\n<p>Link: <a href=\"http:\/\/www.crn.com\/news\/security\/240154963\/malware-behind-oldest-most-active-spam-botnet-gets-refresh.htm\">http:\/\/www.crn.com\/news\/security\/240154963\/malware-behind-oldest-most-active-spam-botnet-gets-refresh.htm<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-413","post","type-post","status-publish","format-standard","hentry","category-malware"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=413"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/413\/revisions"}],"predecessor-version":[{"id":2900,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/413\/revisions\/2900"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}