Share

Top 5 Stories

News

Takedown of Grum botnet completed

20 July 2012

Earlier this week FireEye reported that the takedown of the Grum botnet – the world’s third largest spam machine – was a ‘work in progress’. Yesterday it announced that the work in progress is complete: Grum is no more.

FireEye's task started with an analysis of the bots, discovery of the four command and control servers, and crucially, discovery that the C&C IP addresses are hard coded into the botnet. Two of these were in the Netherlands, one in Panama and one in Russia. FireEye contacted the Dutch authorities and the Dutch servers were quickly taken down. Panama and Russia, however, remained in operation.

Then came news that the Panamanian authorities had responded to mounting pressure. “The ISP owning this server at last buckled under the pressure applied by the community,” said Atif Mushtaq in a new blog. “It was great news.” But it still left the server in Russia, meaning that the bot herders still had access to their botnet. The “good news was soon followed by some bad news,” he added. “The bot herders moved quickly and started pointing the rest of the CnCs to new secondary servers in Ukraine.”

Mushtaq went back to the community. He shared his intelligence with Spamhaus, CERT-GIB (the Russian CERT), and an independent researcher known as Nova7. It worked. “As a result of this overnight operation, all six new servers in Ukraine and the original Russian server were dead as of today,” he reported.

Grum is dead – or at least truly fatally wounded. “According to data coming from Spamhaus,” wrote Mushtaq, “on average, they used to see around 120,000 Grum IP addresses sending spam each day, but after the takedown, this number has reduced to 21,505. I hope that once the spam templates expire, the rest of the spam with fade away as well.”

Unlike many takedowns where the botnets just seem to keep coming back, Grum has gone and gone forever. The infected zombies will remain infected but inactive. James Todd, technical lead at FireEye, explained his confidence. “Since Grum uses hard coded IP addresses to communicate with the primary and secondary CnC servers rather than host names, removing those IP addresses permanently disconnects all infected machines and prevents them ever reconnecting.” So unless the bot herders can persuade ISPs to reassign the same IP addresses to servers they control, Grum is gone. Any new Grum would have to be rebuild from the ground up.

This article is featured in:
Internet and Network Security  •  Malware and Hardware Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×