Story image

FBI disrupts multiple botnets as part of anti-fraud operation

29 Nov 18

An FBI-led takedown has disrupted a large multiyear scam that saw cyber criminals use botnets to manipulate internet traffic from 1.7 million IP addresses and generate nearly 30 million dollars in fraudulent ad revenue.

F-Secure supported the takedown operation by providing threat intelligence on the scam’s malware campaigns and botnets. 

The ad fraud ring, dubbed “3ve, in an advisory published by US-CERT, built two different botnets by spreading Kovter and Boaxxe malware to individuals through spam emails and drive-by downloads.

3ve used these botnets to manipulate internet traffic and direct it to ads they ran under the pretence that the traffic was from real visitors.

Estimates suggest 3ve’s botnets allowed them to manipulate internet traffic from as many as 1.7 million IPs at once.

The takedown, described yesterday in a news release from the US Department of Justice, saw the FBI search 89 servers and sinkhole 31 domains to disrupt the botnets, and seize bank accounts connected with the group.

The operation led to multiple charges being laid against eight individuals.

F-Secure played a supporting role in the FBI-led effort by exposing parts of 3ve’s botnets and malware campaigns for the authorities.

F-Secure researcher Paivi Tynninen says, “3ve blasts out failed delivery notification spam, which is a common attack vector these days. Users open an attachment or click a link and end up infected with Kovter, Boaxxe or even both.”  

“3ve also uses malvertising that redirects users to fake software updates and tricks victims into installing Kovter, which is a fairly popular social engineering tactic.”

3ve used the Boaxxe botnet as a proxy for fraudulent ad requests sent from their own data centre in Germany.

The Kovter botnet was a network of infected PCs that ran a hidden browser from users, which 3ve used to discreetly direct traffic toward their ads.

Fabricating internet traffic with these botnets helped 3ve convince buyers their ads were being viewed by countless numbers of people.

It’s a type of fraud that many don’t realise is happening, but it’s actually a fairly prevalent type of cyber crime.

A 2016 report from the World Federation of Advertisers projected that ad fraud revenues could balloon to anywhere between 50 to 150 billion dollars per year by 2025.

“Ad fraud might not feel like a very pressing issue. But it costs a lot of businesses a lot of money, and those costs eventually get fed back to consumers,” says F-Secure security advisor Sean Sullivan.

“That makes these kinds of takedown operations beneficial to not just companies or advertisers, but pretty much everyone.”

While the takedown successfully disrupted 3ve’s operations, the persistent nature of today’s botnets makes it difficult to say for certain whether or not 3ve is gone for good.

Sullivan says that even though many organisations contributed to the operation, they need help from individual PC users to ensure 3ve can’t bounce back.

“Most modern botnets have pretty sophisticated backends that are extremely resistant to takedown attempts. Infected PCs can be used to begin rebuilding, so it’s really important that individuals check their PCs and remove the malware if they discover an infection,” says Sullivan.

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.