Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or with a cyber scam, malicious agents are around us, they have infected a huge quantity of machines with dramatic consequences.

But what’s happen if we discover the malware inside the controller of ordinary object that surround us? What could happen if malicious code is installed directly in the factory?

We discussed several times regarding the alleged presence of backdoor inside Chinese network equipment, a nightmare that scare security experts and that could open the doors to disturbing incidents.

Sometimes the reality goes beyond the imagination, Microsoft in fact has published evidence of the presence of a bot agent  installed and hidden on personal computers  during their assembly in China.

The malware being pre-installed onto computers at the factories, this malware is loaded onto the computers before it reaches a customer or end purchaser. This means that the malware is loaded after the product is shipped by the original equipment manufacturer to a distributor, transporter, or reseller. 

Microsoft, in particular its Digital Crimes Unit, has started the investigation in August 2011, naming the operation ‘Operation B70’, finding several brand new laptops and desktop PCs from various cities in China infected with backdoor and rootkit such as ‘Nitol’.

The blog post states:

“A supply chain between a manufacturer and a consumer becomes unsecure when a distributor or reseller receives or sells products from unknown or unauthorized sources. In Operation b70, we discovered that retailers were selling computers loaded with counterfeit versions of Windows software embedded with harmful malware.” 

The responsibles for the spread of malware in the supply chain had planned to build a large botnet to use to attacks their victims with DDoS attack or to spread other malicious agents.

The process of infection is really smart, the compromised factory made PC where used also as starting point for the infection, they were able to transfer the malware on every removable drives connected.

The domain, used as Command & Control server for Nitol agent, 3322.org, also hosted other 500 different strains of malware on more than 70,000 sub-domains to gain complete control of victims and to steal information.

Microsoft company has released the following declaration on the investigation made on supply chain security:

“What’s especially disturbing is that the counterfeit software embedded with malware could have entered the chain at any point as a computer travels among companies that transport and resell the computer,”

The study proposed by Microsoft on the event shown how cybercriminals exploiting a new way to spread malware preloading malicious code inside counterfeit software deployed onto computers that are offered for sale. To give an idea of the phenomenon 20% of the PCs researchers bought from an unsecure supply chain were infected with malware.

Last week, the U.S. District Court for the Eastern District of Virginia granted Microsoft’s Digital Crimes Unit permission to disrupt more than 500 different strains of malware discovered during the investigation, it is the second botnet disruption in the last six months operated by the company.

The action against the Nitol botnet is considered as part of a larger Project MARS (Microsoft Active Response for Security) Program to proactively eliminate malware threats that target its customers and MS services.

The scenario proposed is really worrying, the installation of a malware during manufacture raise the question on the security level ensured during the supply chain and the possible effect of a massive diffusion of agents spread using compromised machines.

Microsoft is one of the most active companies against the botnet diffusion, let’s consider that these agents are mainly designed for Windows machines, the recent study on Cybercrime evolution in North America and Western Europe revealed in fact that most attacked OS are Windows, Android and Mac OS X.

An interesting initiative of Microsoft is that companies plans to give third-parties access to its botnet intelligence feeds through an API, CERTs, ISPs and even foreign governments could so benefit of the information provided by the firm, a first step in the fight of botnet.

Microsoft’s Digital Crimes Unit (DCU) has announced that it is beta testing a system “described as a sort of real time honeypot that attempts to connect to and monitor bot  and C&C servers gathering data in traffic patterns”.

In the future to avoid similar problems it is fundamental  that suppliers, resellers, distributors and retailers involved in the supply chain implement best practices to safeguard people from harmful counterfeit software.

“They need to adopt and practice stringent policies that ensure that the computers and software they purchase and resell come from trustworthy sources. “

Microsoft post conclude promising help to all its client providing information and tool to mitigate the incoming cyber threats.

“If you believe your computer might be infected with malware, we encourage you to visit http://support.microsoft.com/botnets as this site offers free information and tools to analyze and clean your computer.”

Many sites report the news but no one has asked the question of who is responsible for the spread of malware … are we dealing with a simple criminal act or is there a responsibility of the government?

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

8 minutes ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

41 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.