• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Free Trial
  • Contact us
  • Blog
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Products
    • Product
      • Cisco Umbrella Cloud Security Service
      • Cisco Umbrella Investigate
      • Product Packages
      • Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Interactive Intelligence
      • Cloud-Delivered Firewall
    •  
    • Webinar signup
  • Solutions
    • By Need
      • Protect Mobile Users
      • Fast Incident Response
      • Web Content Filtering
      • Shadow IT Discovery & App Blocking
      • Unified Threat Enforcement
      • Reduce Security Infections
      • Secure Direct Internet Access
      • Securing Remote and Roaming Users
    • By Network
      • Protect Guest Wi-Fi
      • SD-WAN Security
      • Off-Network Endpoint Security
    • By Industry
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
      • Our Customers
      • Customer Stories
    • Ransomware Defense for Dummies book
  • Why Us
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Cloud Network Activity
      • Recursive DNS Services
      • Top Reasons to Trial
      • Getting Started
    • Unmatched Intelligence
      • Cyber Attack Prevention
      • Interactive Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco SD-WAN
    • Navigation-dropdown-promo-free-trial_102820
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Analyst Reports
      • Case Studies
      • Customer Videos
      • Datasheets
      • eBooks
      • Infographics
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Cisco Umbrella Blog
      • Latest Posts
      • Security Posts
      • Research Posts
      • Threats Posts
      • Product Posts
      • Spotlight
    • For Customers
      • Support
      • Customer Success Hub
      • Umbrella Deployment Hub
      • Customer Success Webinars
      • What’s New
      • Cisco Umbrella Studio
  • Trends & Threats
    • Market Trends
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
      • Secure Access Service Edge (SASE)
    • Security Threats
      • Ransomware
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
    •  
    • Navigation-dropdown-promo-threat-report_020521
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Become a partner
  • Free Trial Signup
  • Umbrella Login
  • Cloudlock Login
  • Contact Us
Security

Half the Battle: Sinkholes Are Only the Beginning of a Botnet's End

By Owen Lystrup
Posted on April 13, 2015
Updated on April 8, 2020

Share

Facebook0Tweet0LinkedIn0

The news agencies and antivirus companies claiming victory over the Beebone botnet are only half right. The difficult effort of stopping the botnet is complete. “Operation Source,” as it’s become known, was a mark of success for collaboration between international law enforcement agencies and private security firms like Intel, Kaspersky, and Shadowserver. But, as we’ve seen before with cases like Kelihos, botnets can resurface after a dormant period.
While the sinkhole operation was a great success, according to OpenDNS security researcher Mark Nunnikhoven, it is only the first step to ensuring security for those affected by the botnet. The next–and perhaps more crucial–steps are to shutdown the servers involved and clean the infected endpoints.
Beebone–or AAEH as it’s also called–reportedly infected more than 12,000 systems across a number of countries worldwide, though the full scope of infections may not be entirely known. Beebone itself is not a destructive virus, however. It is the delivery mechanism for installing malware like keyloggers, banking trojans, and ransomware onto compromised machines.
The interagency sinkhole essentially chops the botnet’s capability at its knees. However, unless they have been thoroughly cleaned, the endpoints compromised by Beebone are still very much infected. The sinkhole merely means outbound traffic intended for what were formerly command and control (C&C) IPs will now get dropped. This result is positive. It means those infected machines will no longer receive instructions from a malicious server–for now.
“Due to the takedown, these devices are now receiving a benign response, but they still need to be disinfected,” Nunnikhoven wrote in a blog post. “The US-Cert has published links to cleanup tools for various systems that can help with these efforts.”
Screen Shot 2015-04-13 at 2.37.26 PM
Analysis from OpenDNS shows traffic requests to these formerly malicious domains are still at very high levels. “What we’re seeing through our global viewpoint of DNS traffic is requests to the various botnet domains have not dropped significantly since the takedown on April 9th,” Nunnikhoven said. “The continued significant traffic to these domains suggests that cleanup efforts have not been effective yet.”
Unless infected systems are cleaned, hackers responsible for Beebone can essentially pick up where they left off if they included an IP update mechanism with the malware they used. But the cleanup can be incredibly tricky. The collaborative effort to sinkhole such a massive interconnected system of compromised servers is a huge undertaking. But the effort required to individually clean all the machines infected by the Beebone malware is even larger.
Dhia Mahjoub, senior security researcher at OpenDNS, has spent a great amount of time researching botnets like Kelihos and Zbot, which have similar characteristics to Beebone. And he’s fully aware of the challenges involved with stopping them. “Sinkholes are good for telemetry, which will measure the extent of the threat,” he said. “Step two is for law enforcement to actually take down the involved servers, and to clean the endpoint machines.”
But the last part is the most difficult, as it involves finding all the infected machines and somehow communicating to their users that they have been infected and need cleaning.
“Cleanup is incredibly difficult because the burden lies on the individuals using infected machines, or their ISPs,” Mahjoub said. “It’s a huge effort and very expensive. But without it, botnets can potentially pick up where they left off.”

Previous Post:

Previous Article

Next Post:

Next Article

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2021 Cisco Umbrella