{"id":14978,"date":"2014-07-15T17:31:42","date_gmt":"2014-07-15T17:31:42","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2239"},"modified":"2020-02-27T03:46:26","modified_gmt":"2020-02-26T16:46:26","slug":"security-vendors-on-their-own-large-entities-take-on-botnets","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/security-vendors-on-their-own-large-entities-take-on-botnets\/14978\/","title":{"rendered":"Security vendors on their own: large entities take on botnets"},"content":{"rendered":"<p>A week ago Facebook <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_jsonp_14054307484748&amp;key=2b0adaafa9ad8a29fede7758fada1730&amp;libId=71308e8b-c415-4482-a6dd-4b7447045767&amp;loc=http%3A%2F%2Fwww.pcworld.com%2Farticle%2F2452080%2Ffacebook-kills-lecpetex-botnet-which-hit-250000-computers.html&amp;v=1&amp;out=https%3A%2F%2Fwww.facebook.com%2Fnotes%2Fprotect-the-graph%2Ftaking-down-the-lecpetex-botnet%2F1477464749160338&amp;ref=https%3A%2F%2Fwww.google.ru%2F&amp;title=Facebook%20kills%20%27Lecpetex%27%20botnet%20that%20turned%20250k%20PCs%20into%20Litecoin-mining%20zombies%20%7C%20PCWorld&amp;txt=blog%20post\" target=\"_blank\" rel=\"noopener nofollow\">reported<\/a> dismantling a mid-sized botnet codenamed \u201cLecpetex\u201d which was comprised of about 250k PCs. This botnet was interesting since it was forcing infected PCs into mining Litecoin virtual currency. It was also used for spreading spam.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>The most interesting thing here is that Facebook seemingly has very little to do with cybersecurity as a field of concern. It is by no means a security vendor. But yes, it took on cybercriminals, since standing aside was not an option.<\/p>\n<p>The question is: Is it an option for the others? When does \u201caggressive cybersecurity\u201d become a concern for a business?<\/p>\n<p>Well, for Facebook it bass been a major concern for quite some time: This is not the first case of Facebook vs. botnet. Lecpetex was a relatively docile and not exactly huge.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>When is it time for \u201caggressive cybersecurity?\u201d<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FAFn1&amp;text=When+is+it+time+for+%26%238220%3Baggressive+cybersecurity%3F%26%238221%3B\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>\u201cBased on statistics released by the Greek Police, the botnet may have infected as many as 250,000 computers. Those infections enabled those directing the botnet to hijack those computers and use them to promote social spam, which impacted close to 50,000 accounts at its peak,\u201d wrote Facebook\u2019s Threat Infrastructure team. \u201c\u2026The Lecpetex authors appeared to have a good understanding of anti-virus evasion because they made continuous changes to their malware to avoid detection. In total, the botnet operators launched more than 20 distinct waves of spam between December 2013 and June 2014\u201d.<\/p>\n<p>According to Facebook, Lecpetex worked \u201calmost exclusively\u201d by using social engineering techniques to trick victims into running malicious Java applications and scripts. Lecpetex spread through friend and contact networks, and that\u2019s the reason for its geographic distribution: most of the victims reside in Greece.<\/p>\n<p>Facebook had been battling Lecpetex since December 2013, making serious progress earlier this year: a coordinated takedown of technical infrastructure including C2\u2019s, distribution accounts, testing accounts, monetization accounts took place in mid-April, which was followed by referral to Greek law enforcements.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/07\/06020042\/800-5-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2241\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/07\/06020042\/800-5-1.jpg\" alt=\"800-5\" width=\"800\" height=\"530\"><\/a><\/p>\n<p>Finding themselves in hot water, malware authors even left messages for Facebook\u2019s team, demanding \u201cStop breaking my ballz\u2026\u201d<\/p>\n<p>Eventually on July 3rd, Greek police arrested people alleged to be primary authors.<\/p>\n<p>That is, again, not the first occasion when Facebook battles a botnet: late in 2012 the social networking site partnered with FBI to take down Butterfly Botnet (aka Mariposa). That one was much larger and more dangerous than the Lecpetex: it had been spreading banking malware codenamed Yahos which infected about 11 million computers. According to a later report its authors collected more than 850 million from fraudulent transactions.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>At a certain point security is everybody\u2019s business.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FAFn1&amp;text=At+a+certain+point+security+is+everybody%26%238217%3Bs+business.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Facebook had to take action because it was actively used to spread malware: being a vector for attacks is unsettling and harmful, reputation-wise. Facebook isn\u2019t a security vendor on its own, but it had to work as one, since the situation was too bad to turn a blind eye.<\/p>\n<p>Facebook isn\u2019t alone there, though. Microsoft actively and even aggressively takes on the largest botnets, and with the help of industry partners and law enforcement agencies, it has dismantled a number of them over the last several years \u2013 Rustock, Kelihos, Citadel, to name just a few.<\/p>\n<p>Microsoft, again, isn\u2019t recognized as an entity closely associated with the cybersecurity market, even though it has made a number of security-related acquisitions since early 2000s. But most of the PC malware targeted Windows users for years. At a certain point Microsoft decided to go on a crusade against botnets, even though <a href=\"https:\/\/business.kaspersky.com\/gone-fubar-microsoft-nukes-no-ip-gets-fallout\/\" target=\"_blank\" rel=\"noopener nofollow\">not every strife ends with a sound success<\/a>.<\/p>\n<p>Botnet battle is an old story: Messaging, Malware and Mobile Anti-Abuse Working Group (<a href=\"http:\/\/www.maawg.org\/\" target=\"_blank\" rel=\"noopener nofollow\">M3AAWG<\/a>) had been launched back in 2004 with Comcast, Yahoo, AT&amp;T, Verizon and AOL as major participants, in order to work on the best practices for ISPs to mitigate botnets and DDoS attacks launched through them. By the 2004 it was already clear by that time that botnets were a serious problem.<\/p>\n<p>At a certain point every large entity working with large amount of personal data, finds itself in the situation when it has to protect them. And not exactly just passively. Sometime it is necessary to take fight to the cybercriminals\u2019 own territory, taking over their C&amp;C servers, seizing hard drives and requesting warrants to arrest the alleged botnet operators.<\/p>\n<p>All in all, cybersecurity is something that\u2019s everybody\u2019s business, sooner or later.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facebook has little to do with cybersecurity &#8211; it&#8217;s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.<\/p>\n","protected":false},"author":209,"featured_media":16069,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[205,282,20],"class_list":{"0":"post-14978","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-botnets","10":"tag-cybersecurity","11":"tag-facebook"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-vendors-on-their-own-large-entities-take-on-botnets\/14978\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-vendors-on-their-own-large-entities-take-on-botnets\/14978\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-vendors-on-their-own-large-entities-take-on-botnets\/14978\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/botnets\/","name":"botnets"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=14978"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14978\/revisions"}],"predecessor-version":[{"id":26421,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14978\/revisions\/26421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/16069"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=14978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=14978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=14978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}