Categories: Cyber Crime

Rise of DIY, new botnet and keylogger generating tool in the wild

Not a day goes by that we’re talking about powerful cyber attacks and the sensational cyber espionage campaigns, the dangerous trend is also sustained by the increased offer of tools and services in the underground.

Unfortunately the underground market is very dynamic and very difficult to monitor and to aggravate the situation is the leak of knowledge of many security experts on the evolution of cybercrime ecosystem.

Dancho Danchev is one of the most skilled security professional with a deep knowledge of cybercrime ecosystem, he is always monitoring underground market warning security community on the diffusion of DIY (Do-it-Yourself Cybercrime) cybercrime-friendly tools that are approaching to the cybercrime the ordinary crime and criminals in search of profit with little knowledge of the subject.

How does it bear an offer into an underground community?

Typically a cybercriminal constitute a first seed of community inviting only cybercrime-friendly community members, he usually posts the results of his analysis on the code of malware bot, in particular he provides evidence of its efficiency publishing piece of source code. For bot efficiency one of the most interesting features is the Domain Generation Algorithm (DGA), the algorithm is used to periodically generate a large number of domain names that can be used as rendezvous points with their controllers.

The greater the number of domain names and more difficult is for security firms and law enforcement to decapitate the botnet. Usually law enforcement adopts Sinkhole techniques to neutralize botnet, botnet traffic is redirected to a “sinkhole,” allowing the authorities to oversee traffic from infected machines and prevent further diffusion of malicious code.

To elude monitoring of law enforcement botnet authors use public key cryptography mutual authenticate bots and C&C servers, in this way infected machines will be able to accept commands sent by controller servers verifying their identities.

In the case mentioned by Danchev in his post, the communication between bots and C&C servers relies on the Remote Desktop Protocol (RDP),  if the ports are disabled malicious code will tunnel the connection on a random port.

Key features of the DIY botnet include:

– Displays all the statistics about the infected host (OS, Host, NAT etc.)
– The last time of the activity of the bot
– Collects information about the payment system/banking system used on the infected machine.
– Has the ability to update the version of the bot.
– Search the log files. Ability to define tags to posts for easy sorting.
– Logs errors and access to the administrative panel.
– Controls who’s authorized to view the logs of access to the admin panel.
– Controls who’s authorized to view the logs of otstuk bots.
– Fixed an error which allows to generate a domain name from the domains range, and intercept bots.
– Supported keylogger
– Can downlaod and execute additional files on the affected hosts.

Following a Sample screenshot of the DIY botnet generating tool & command and control interface:

Danchev is still monitoring the development of the DIY botnet generating tool  and soon will be published updates as soon as new developments take place, it must be considered that the underground is full similar offers for various categories of instruments and services. 

The security expert noted that cybercrime has stimulated the growth of DIY demand providing a sales model that meets the customer’s needs and provide him all necessary support during the life cycle of the products from exclusive services available only to community members, to DIY cybercrime-friendly tools.

Another interesting phenomena described by Danchev is the diffusion of DIY cybercrime-friendly tools, and related promotion, under the umbrella of a community brand to boost the sales.

It is the case for example of a HTTP/SMTP-based keylogger that’s sold to members of a cybercrime-friendly community since 2011 and show in the following pictures:

 

The Key Logger includes typically functionalities of this family of products such as the ability to automatically copy clipboard content in the log file or write a separate log for each and every process, but what’s also characterize this particular software is that the DIY builder is coded for each and every customer individually in an attempt to prevent detection by the security community.

As usually the price is really amazing, just 60 WMZ (WebMoney) or ~$70.00 US … it is not difficult to forecast rapid diffusion of future release improved with functionalities directly committed by the community, that’s why the monitoring of underground, is a critical phase of the phase in the fight to cyber crime … if you know them, you can defeat them!

Pierluigi Paganini

(Security Affairs – Cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

10 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

12 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

12 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

14 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

16 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

1 day ago

This website uses cookies.