Categories: SecurityWorkspace

Kelihos II Crippled by Kaspersky and Co

The second Kelihos botnet has been wrested from the arms of cyber criminals, releasing over 110,000 computers from the malicious network operator’s grasp.

The botnet, which used similar code to the first, smaller Kelihos network that was taken out last year, was “sinkholed” in a collaborative effort involving Kaspersky, Dell Secureworks, members of the Honeynet Project and start-up firm CrowdStrike Intelligence Team.

The sinkholing operation saw the security vendors communicate with infected machines and had them send data to their servers rather than the six command and control servers run by the Kelihos owners in three different locations. Kelihos 2 was running on a peer-to-peer network, allowing the security companies to talk with other infected machines to take down the botnet, rather than go for the C&C servers themselves.

Abandon ship

The C&C infrastructure has been abandoned by the owners, Kaspersky confirmed today during a press conference. Earlier this month, GFI Software warned Kelihos was still causing carnage and continuing to gain momentum in the wild, yet for now it appears to be down again.

Kelihos 2’s main purpose was to carry out spam campaigns and initiate DDoS attacks. The majority (24.5 percent) of infected machines were in Poland, although 10.8 percent of infections were in the US.

For now, Kaspersky and its collaborators can do little with the infected machines. The company is handing over IP address details to ISPs so they can take action. Data is also being shared with law enforcement, but Kaspersky said it would like to see changes in legislation so it can do more to completely take out botnets.

“We will keep the sinkhole up as long as possible,” said CrowdStrike researcher Tillmann Werner. “Hopefully we will see the number of infected machines decrease over time.”

The Kelihos 2 creators effectively bought victims from other botnet owners, who let malware drop on to machines running on their own malicious networks for a fee. Tilmann told TechWeekEurope it was therefore “possible” the information from the Kelihos 2 sinkholing operation could be used to track other botnet activity.

“It’s very likely the infected machines are infected with something else, but usually you don’t have access to that kind of information,” he added.

The Kelihos 2 gang has been operating since 2007, continuing to create new botnets when one is taken out of action. It is believed they were responsible for the infamous Storm and Waledac botnets. Werner said it was expected the gang would come back with a new malicious network at some point.

The first Kelihos botnet, which controlled around 40,00 machines, was taken down last year. In January, Microsoft said it suspected an ex-antivirus worker from Russia was behind the operation, but later that month the accused, Andrey Sabelnikov, proclaimed his innocence in a blog post.

How much do you know about IT security? Test your knowledge with our quiz.

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

OpenAI Backers ‘Betting It Will Be Worth Trillions’

Venture capital firms participating in $6bn-plus OpenAI funding round betting start-up will be worth trillions,…

9 hours ago

Coinbase Challenges SEC Over Crypto Rules

Coinbase tells federal appeals court SEC has made it impossible to operate compliant crypto business…

10 hours ago

Xiaomi Asks For Recall Of India Antitrust Report

Smartphone maker Xiaomi asks Indian antitrust regulator to recall August report, saying it failed to…

10 hours ago

US Proposes Ban On Chinese, Russian Components In Cars

US proposes ban on sale of cars with Russian- or Chinese-made parts, amidst fears of…

11 hours ago

Jony Ive Confirms Working With OpenAI’s Altman On Device

Former Apple designer Sir Jony Ive confirms working with OpenAI chief Sam Altman on AI…

11 hours ago

LinkedIn Suspends Use Of UK Data For AI

Microsoft-owned LinkedIn suspends use of UK user data to train generative AI after concerns expressed…

12 hours ago