Pushdo botnet is evolving, becomes more resilient to takedown attempts

A new Pushdo malware variant uses domain generation techniques to call home if normal communications fail, researchers say

Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts.

The Pushdo Trojan program dates back to early 2007 and is used to distribute other malware threats, like Zeus and SpyEye. It also comes with its own spam engine module, known as Cutwail, which is directly responsible for a large portion of the world's daily spam traffic.

The security industry has tried to shut down the Pushdo/Cutwail botnet four times during the last five years, but those efforts only resulted in temporary disruptions.

In March, security researchers from Damballa identified new malicious traffic patterns and were able to trace them back to a new variant of the Pushdo malware.

"The latest variant of PushDo adds another dimension by using domain fluxing with Domain Generation Algorithms (DGAs) as a fallback mechanism to its normal command-and-control (C&C) communication methods," the Damballa researchers said Wednesday in a blog post.

The malware generates over 1,000 non-existent unique domain names every day and connects to them if it cannot reach its hard-coded C&C servers. Since the attackers know how the algorithm works, they can register one of those domains in advance and wait for the bots to connect in order to deliver new instructions.

This technique is intended to make it hard for security researchers to shut down the botnet's command-and-control servers or for security products to block its C&C traffic.

"PushDo is the third major malware family that Damballa has observed in the last 18 months to turn to DGA techniques as a means of communicating with its C&C," the Damballa researchers said. "Variants of the ZeuS malware family and the TDL/TDSS malware also use DGA in their evasion methods."

Researchers from Damballa, Dell SecureWorks and the Georgia Institute of Technology worked together to investigate the malware's new variant and measure its impact. Their findings were published in a joint report released Wednesday.

In addition to using DGA techniques, the latest Pushdo variant also queries over 200 legitimate websites on a regular basis in order to blend in its C&C traffic with normal-looking traffic, the researchers said.

During the investigation, 42 domain names generated by Pushdo's DGA were registered and the requests made to them were monitored in order to get an estimation of the botnet's size.

"Over the period of almost two months, we observed 1,038,915 unique IPs posting C&C binary data to our sinkhole," the researchers said in their report. The daily count was between 30,000 to 40,000 unique IP (Internet Protocol) addresses, they said.

The countries with the highest infection count are India, Iran and Mexico, according to the collected data. China, which is usually at the top of the list for other botnet infections, is not even in the top ten, while the U.S. is only in sixth place.

The Pushdo malware is generally distributed through drive-by download attacks -- Web-based attacks that exploit vulnerabilities in browser plug-ins -- or is installed by other botnets as part of pay-per-install schemes used by cybercriminals, the researchers said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags DellsecurityDamballamalware

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?