Story image

FBI disrupts multiple botnets as part of anti-fraud operation

29 Nov 2018

An FBI-led takedown has disrupted a large multiyear scam that saw cyber criminals use botnets to manipulate internet traffic from 1.7 million IP addresses and generate nearly 30 million dollars in fraudulent ad revenue.

F-Secure supported the takedown operation by providing threat intelligence on the scam’s malware campaigns and botnets. 

The ad fraud ring, dubbed “3ve, in an advisory published by US-CERT, built two different botnets by spreading Kovter and Boaxxe malware to individuals through spam emails and drive-by downloads.

3ve used these botnets to manipulate internet traffic and direct it to ads they ran under the pretence that the traffic was from real visitors.

Estimates suggest 3ve’s botnets allowed them to manipulate internet traffic from as many as 1.7 million IPs at once.

The takedown, described yesterday in a news release from the US Department of Justice, saw the FBI search 89 servers and sinkhole 31 domains to disrupt the botnets, and seize bank accounts connected with the group.

The operation led to multiple charges being laid against eight individuals.

F-Secure played a supporting role in the FBI-led effort by exposing parts of 3ve’s botnets and malware campaigns for the authorities.

F-Secure researcher Paivi Tynninen says, “3ve blasts out failed delivery notification spam, which is a common attack vector these days. Users open an attachment or click a link and end up infected with Kovter, Boaxxe or even both.”  

“3ve also uses malvertising that redirects users to fake software updates and tricks victims into installing Kovter, which is a fairly popular social engineering tactic.”

3ve used the Boaxxe botnet as a proxy for fraudulent ad requests sent from their own data centre in Germany.

The Kovter botnet was a network of infected PCs that ran a hidden browser from users, which 3ve used to discreetly direct traffic toward their ads.

Fabricating internet traffic with these botnets helped 3ve convince buyers their ads were being viewed by countless numbers of people.

It’s a type of fraud that many don’t realise is happening, but it’s actually a fairly prevalent type of cyber crime.

A 2016 report from the World Federation of Advertisers projected that ad fraud revenues could balloon to anywhere between 50 to 150 billion dollars per year by 2025.

“Ad fraud might not feel like a very pressing issue. But it costs a lot of businesses a lot of money, and those costs eventually get fed back to consumers,” says F-Secure security advisor Sean Sullivan.

“That makes these kinds of takedown operations beneficial to not just companies or advertisers, but pretty much everyone.”

While the takedown successfully disrupted 3ve’s operations, the persistent nature of today’s botnets makes it difficult to say for certain whether or not 3ve is gone for good.

Sullivan says that even though many organisations contributed to the operation, they need help from individual PC users to ensure 3ve can’t bounce back.

“Most modern botnets have pretty sophisticated backends that are extremely resistant to takedown attempts. Infected PCs can be used to begin rebuilding, so it’s really important that individuals check their PCs and remove the malware if they discover an infection,” says Sullivan.

Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.
Bitglass appoints new cloud, business development leaders
The cloud security company has appointed vice presidents for worldwide channels and worldwide business development.