FBI takes down Dridex botnet, seizes servers, arrests suspect

C&C malware factory


The FBI has teamed up with security vendors to disrupt the operations of Dridex banking Trojan.

Multiple command-and-control (C&C) servers used by the Dridex Trojan have been taken down and seized in a co-ordinated action after the FBI obtained court orders. The take-down operation is geared towards crippling the malware’s control network, which is used to upload stolen information to crooks behind the network as well as pushing instructions and software configuration to zombie nodes on the botnet. Attack traffic is being re-routed towards sinkholes under the control of an organisation called The Shadowserver Foundation.

In addition, Moldovan Andrey Ghinkul has been charged by the US with multiple offences related to allegedly acting as the kingpin behind Bugat/Dridex. Ghinkul (whom the Feds allege is AKA Smilex), 30, was arrested in late August in Cyprus but not named at the time. The US is seeking his extradition on charges of criminal conspiracy, unauthorised computer access with intent to defraud, damaging a computer, wire fraud and bank fraud, as a DoJ statement explains.

Dridex has stepped out of the shadow of ZeuS and become one of the most prevalent banking Trojans over recent months. It has breached tens of thousands of organisations across 27 countries around the globe and has been responsible for over £20m (roughly $30.5m) in losses in the UK, and at least $10m in losses in the United States.

The cybercrime toolkit, which bundles a variety of key-logging and web-inject functionality has infected tens of thousands of computers worldwide and targets the theft of financial credentials, certificates, cookies to facilitate online banking and wire fraud. Dridex - which first surfaced in July 2014 and is generally considered a descendant of an earlier banking trojan called Cridex - hit the UK, US and France especially hard.

Dridex is distributed through spam emails in various guises. Initially the spam email attachments exploited vulnerabilities. More recently however, the attackers have used Microsoft Word macros to infect systems. After the target opens the Word document, the macro attempts to download and execute the Dridex loader, which in turn installs the other botnet components.

The Dridex botnet operates an affiliate model and the botnet itself is partitioned into 13 sub-botnets, and each affiliate is given access to its own subset of bots. The takedown was accomplished by poisoning each sub-botnet’s P2P network and redirecting infected systems to a sinkhole, This meant infected computers of the Dridex botnet are no longer under the cybercrooks. Compromised machines are still infected so a clean up operation needs to take place. US CERT has advice on that front here.

Dridex features many of the same techniques and tactics as earlier botnets such as Gameover Zeus and its recent success can be at least partly explained by its exploitation of a gap in the market left by the earlier Gameover Zeus botnet takedown.

“The takedown of the Gameover Zeus botnet in June 2014 as part of Operation Tovar left a void in the cybercriminal community, particularly for those targeting financial institutions,” Brett Stone-Gross of Dell SecureWorks’ Counter Threat Unit explained. “To fill this gap, threat actors created new botnets, including Dridex and Dyre. CTU researchers have observed a significant overlap in the tactics, techniques, and procedures (TTPs) between Gameover Zeus and both Dridex and Dyre, indicating that previous affiliates had moved on to new botnet business ventures and were continuing to carry out their fraudulent activities. However, neither Dridex nor Dyre has been able to rival the sophistication, size and success of Gameover Zeus.” ®

Similar topics

Broader topics


Other stories you might like

  • Talos names eight deadly sins in widely used industrial software
    Entire swaths of gear relies on vulnerability-laden Open Automation Software (OAS)

    A researcher at Cisco's Talos threat intelligence team found eight vulnerabilities in the Open Automation Software (OAS) platform that, if exploited, could enable a bad actor to access a device and run code on a targeted system.

    The OAS platform is widely used by a range of industrial enterprises, essentially facilitating the transfer of data within an IT environment between hardware and software and playing a central role in organizations' industrial Internet of Things (IIoT) efforts. It touches a range of devices, including PLCs and OPCs and IoT devices, as well as custom applications and APIs, databases and edge systems.

    Companies like Volvo, General Dynamics, JBT Aerotech and wind-turbine maker AES are among the users of the OAS platform.

    Continue reading
  • Despite global uncertainty, $500m hit doesn't rattle Nvidia execs
    CEO acknowledges impact of war, pandemic but says fundamentals ‘are really good’

    Nvidia is expecting a $500 million hit to its global datacenter and consumer business in the second quarter due to COVID lockdowns in China and Russia's invasion of Ukraine. Despite those and other macroeconomic concerns, executives are still optimistic about future prospects.

    "The full impact and duration of the war in Ukraine and COVID lockdowns in China is difficult to predict. However, the impact of our technology and our market opportunities remain unchanged," said Jensen Huang, Nvidia's CEO and co-founder, during the company's first-quarter earnings call.

    Those two statements might sound a little contradictory, including to some investors, particularly following the stock selloff yesterday after concerns over Russia and China prompted Nvidia to issue lower-than-expected guidance for second-quarter revenue.

    Continue reading
  • Another AI supercomputer from HPE: Champollion lands in France
    That's the second in a week following similar system in Munich also aimed at researchers

    HPE is lifting the lid on a new AI supercomputer – the second this week – aimed at building and training larger machine learning models to underpin research.

    Based at HPE's Center of Excellence in Grenoble, France, the new supercomputer is to be named Champollion after the French scholar who made advances in deciphering Egyptian hieroglyphs in the 19th century. It was built in partnership with Nvidia using AMD-based Apollo computer nodes fitted with Nvidia's A100 GPUs.

    Champollion brings together HPC and purpose-built AI technologies to train machine learning models at scale and unlock results faster, HPE said. HPE already provides HPC and AI resources from its Grenoble facilities for customers, and the broader research community to access, and said it plans to provide access to Champollion for scientists and engineers globally to accelerate testing of their AI models and research.

    Continue reading

Biting the hand that feeds IT © 1998–2022