We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Spam canned as Estonian ISP kills Srizbi botnet

Botnet controls hundreds of thousands of PCs

An Estonian ISP that temporarily hosted the command-and-control servers for the Srizbi botnet, responsible for a large portion of the world's spam, has cut off those servers, according to computer security analysts.

Starline Web Services, based in Estonia's capital Tallinn, had hosted four domain names identified as the control points for Srizbi, according to researchers from computer security firm FireEye.

Hundreds of thousands of PCs around the world infected with Srizbi, a difficult-to-remove rootkit that's used for sending spam, were programmed to seek new instructions from servers in those domains.

Srizbi is considered one of the more powerful botnets, with at least 450,000 PCs infected. It's estimated that half of the world's spam originated from computers infected with Srizbi. Spam remains a profitable business for cybercriminals.

But spammers lost control of Srizbi when the ISP that previously hosted its command-and-control servers was cut off from the internet. McColo, whose servers are based in San Jose, California, was cut off by its upstream providers earlier this month after being exposed by computer security experts and the Washington Post.

That left spammers unable to control Srizbi-infected computers. But Srizbi's code contained a fallback mechanism where spammers could reconnect with the stranded machines if such a scenario occurred.

An algorithm within Srizbi would periodically generate new domain names where the malware would look for new instructions if those domains were live on the internet. Armed with that same algorithm, the spammers had only to register the appropriate domain names and point them to their servers.

The spammers, however, needed a new ISP to host those servers, at least for a while. They found Starline Web Services, a very small ISP, but that provider has since also cut them off.

"I was satisfied that those sites were closed down," said Hillar Aarelaid, chief security officer for Estonia's Computer Emergency Response Team (CERT), on Thursday.

Attempts to contact Starline Web Services were unsuccessful. But Aarelaid said CERT has been in contact with the company, and it does appear to be responsive to complaints about abuse.

Starline Web Services buys its connectivity from Compic, another Estonian company. Compic has been flagged by Estonia's CERT as having websites hosting malicious software, said Tarmo Randel, an information security expert at the organisation.

Randel said CERT has "constantly" notified Compic about malware they've hosted. Compic will take action to remove the sites depending "on how loud we scream," Randel said. Compic usually reacts fast when CERT sends a complaint email - and copies the Estonian Criminal Police, Randel said.

On Thursday, Compic's upstream provider, Linxtelecom, sent an email to the Estonian ISP community that said they are planning to cut off Compic, Randal said.

Linxtelecom sells IP transit services that connect local ISPs and telecommunications operators with larger data carriers. Linxtelecom said in the email that 99 percent of the complaints that it receives over abuse are related to Compic, Randel said.

A Linxtelecom official said he did not know about the email. Compic does respond to complaints within two days or so, but Linxtelecom in the past cut off connectivity to websites hosted by Compic after complaints, the official said.

Computer security experts say there are a handful of ISPs and domain name registrars that work closely with cybercriminals to support spam operations, websites that sell fake software and other scams.

The operations are difficult to stop due to their international nature, the speed with which cybercriminals react to shutdowns and the lack of law enforcement resources or interest.

McColo's shutdown came after research was published which showed the extent to which the company was involved in the criminal underground.

Similarly, another noted bad ISP - known as Atrivo or Intercage - was cut off by its upstream providers in September as a result of mounting pressure from the computer security community.

"With the recent cases of McColo and Atrivo/Intercage taken off the internet, it will be easier in the future to put more pressure on other known hosters of badware to take action or go offline," said Toralv Dirro, security strategist for McAfee's Avert Labs, on Thursday.


IDG UK Sites

Samsung Galaxy S5 mini vs HTC One mini 2 comparison review: Design and price beats additional...

IDG UK Sites

Why local multiplayer gaming is rapidly vanishing: we look at the demise of split-screen and LAN...

IDG UK Sites

Colour-depth not resolution is what will make 4K a success or failure

IDG UK Sites

iPhone 6 vs iPhone 6 Plus: Which new iPhone 6 model should I buy?