Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[November 08, 2024, 04:31:03 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 How Kaspersky Lab and CrowdStrike Dismantled the Second Hlux/Kelihos Botnet: Suc
Pages: [1]   Go Down
  Print  
Author Topic: How Kaspersky Lab and CrowdStrike Dismantled the Second Hlux/Kelihos Botnet: Suc  (Read 912 times)
RealWire
TWI Hero
**********



Karma: 0
Offline Offline

Posts: 18530


View Profile Email


Abingdon, UK, 28 March 2012 – In their ongoing assault against botnet operators and cyber-crime, Kaspersky Lab’s experts, along with the CrowdStrike Intelligence Team, Dell SecureWorks and members of the Honeynet Project, have successfully worked together to execute the takedown of the second Hlux (also known as Kelihos) botnet. This botnet was almost triple the size of the first Hlux/Kelihos botnet that was disabled in September 2011. Within just five days of starting the takedown procedure, Kaspersky Lab has neutralised more than 109,000 infected hosts. The first Hlux/Kelihos botnet was estimated at having only 40,000 infected systems.

In January 2012 Kaspersky Lab experts released new research that revealed that despite the original botnet being neutralised and under control, a second Hlux/Kelihos botnet was operating in the wild. Although the second botnet was new, the malware had been built using the same coding as the original Hlux/Kelihos botnet. This malware showed the second botnet had a few new updates, including infection methods and Bitcoin features for mining and wallet-theft. Similar to the first version, the second botnet also used its network of infected computers to send spam, steal personal data, and perform distributed denial of service (DDoS) attacks on specific targets.

How the second Hlux/Kelihos Botnet was disabled
During the week commencing 19 March 2012, Kaspersky Lab, the CrowdStrike Intelligence Team, Dell SecureWorks and the Honeynet Project launched a sinkholing operation which successfully disabled the botnet. Both Hlux/Kelihos botnets were peer-to-peer (P2P) type botnets, which means every member of the network can act as a server and/or client, as opposed to traditional botnets that rely on a single Command & Control (C&C) server. To neutralise the flexible P2P botnet, the group of security experts created a global network of distributed machines that were installed into the botnet’s infrastructure.  After a short time, the sinkhole-network increased its “popularity” in the network, which allowed more infected computers to be brought under Kaspersky Lab’s control, while preventing the malicious bot-operators from accessing them. As more infected machines were neutralised, the P2P architecture caused the botnet’s infrastructure to “sink” since its strength weakened exponentially with each computer it lost control of.

Since the sinkholing operation began on 19 March, the botnet has been inoperable. With the majority of botnets connected to the sinkhole, Kaspersky Lab’s experts can conduct data mining to track the number of infections and their geographical locations. To date Kaspersky Lab has counted 109,000 infected IP addresses. The majority of infected IP addresses were located in Poland.

The First Hlux/Kelihos Botnet
This is not the first time Kaspersky Lab has encountered versions of the Hlux/Kelihos botnet. In September 2011, Kaspersky Lab worked with Microsoft’s Digital Crimes Unit, SurfNet and Kyrus Tech, Inc., to successfully disable the original Hlux/Kelihos botnet. At that time Kaspersky Lab executed a sinkhole operation, which disabled the botnet and its backup infrastructure from the C&C.

For a complete analysis of the second Hlux/Kelihos operation please visit the latest post on Securelist.

For common questions about P2P botnets, sinkholing and the Hlux/Kelihos takedowns, please see our FAQ sheet.

Kaspersky Lab would like to thank the CrowdStrike Intelligence Team, Dell SecureWorks and the Honeynet Project for its support in the operation.

-ENDS-

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.122 seconds with 23 queries.