4.1.18

ESET Research: Wauchos now headed for extinction?



A recent operation by law enforcement authorities worldwide disrupted hundreds of sprawling botnets across the globe. The botnets, or networks of ‘bots’ that do the bidding of their masters, were powered by malware, most of which was classified by ESET researchers under the Win32/TrojanDownloader.Wauchos detection name, but also known as Gamarue or Andromeda by some other security vendors.
The international crackdown on November 29 came after a concerted effort by Microsoft and ESET researchers that ran for more than a year. ESET provided technical intelligence for the operation after tracking the botnets, identifying their command and control (C&C) servers, and keeping tabs on what those behind the threat were installing on victims’ systems. We sat down with ESET Senior Malware Researcher Jean-Ian Boutin to talk about ESET’s role in this operation, as well as about threats that botnets pose in general.
Given that Wauchos has been one of the longest-running malware families around, what made it so long-lived?
Wauchos has been around since 2011 and was available in underground forums and has thus been sold to various people. Also, its numerous features and continuing development were appealing to the cybercriminals who ended up using it for long periods.
Why did it take so long to crack down on it?
This type of operation takes a long time. As mentioned in the blog, this effort started in 2015. It took a long time to get everything ready for a law enforcement operation. Also, there must be appropriate entities that are willing to put the necessary resources into putting an end to a botnet. Thus, the botnet must be very prevalent and cause a lot of harm to instigate an operation on this scale.
Which countries bore the brunt of the infestation?
Most of the infestations we’ve seen in the past six months were in South-East Asia and South America.
What kind of devices were affected the most? Home computers, corporate computers, servers…?
Wauchos infection vectors included social media, removable media, spam and drive-by downloads. As none of these are targeting any particular group of users, pretty much every computer user clicking a link is a potential victim.
What was your role in the takedown operation, and what did your research and collaboration with Microsoft and law enforcement involve?
Our role in the operation was on the technical side: malware analysis and finding C&C servers used by the different Wauchos botnets. As this threat was sold in underground forums, it was important to make sure that all Wauchos C&C servers were identified and taken down simultaneously. We helped with this effort through our botnet tracker system.
How did you capture and analyze the malware behind the botnet?
The first step was to analyze the bot’s network protocol and behavior in order to include it in our botnet tracker platform. This platform can automatically analyze samples received from our clients, extract the relevant information and use this to connect directly to the malware C&C server. Through this, we can gather the relevant information for this operation automatically by analyzing the Wauchos samples reported to us by our clients.
How did you make sure the criminals were unaware of your research?
Of course, when working on this type of operation, it is of primary importance to make sure that criminals are not aware of it. So, we tried to inform only the people who needed to know about it and to keep the sensitive information private.
What was the most common type of damage caused by Wauchos after a computer was infested?
Historically, Wauchos was used to steal login credentials through its form grabber plugin and install additional malware onto the infected system.
What was the most common way in which the machines were compromised?

As Wauchos was bought and then distributed by a variety of cybercriminals, the infection vectors used to disseminate this threat varied greatly. Historically, Wauchos samples were distributed through social media, instant messaging, removable media, spam, and exploit kits.
Were there any signs obvious to the user that indicated that a computer had been compromised by Wauchos?
Not really.
How was the botnet monetized? I take it that money was the reason why the botnets were started in the first place.
As Wauchos was sold on underground forums, there were various monetization schemes. One of them was to use the form grabber plugin to steal passwords for online accounts. Another one was, for a fee, to install additional malware on the compromised machine, a wildly popular scheme amongst cybercriminals and known as ‘pay-per-install’.
What kind of C&C infrastructure did the Wauchos operators use to control the ‘zombie’ computers?
They were using several C&C servers located in various locations. It is these servers that were targeted in the takedown operation.
Was there any reliable way to detect that a bot was communicating with its C&C server?
Wauchos bots were using a recognizable network pattern when communicating with their C&C servers. This allowed us to protect our users better by adding another layer of protection: the creation of network detections to be able to recognize when a bot was trying to reach out to its C&C server.
How did you find out about communication between an infested computer and its C&C server and how did that communication take place?
The details of the network communication can be found in the blog. It was obtained by reverse engineering the various samples.
Was C&C traffic encrypted?
Yes, it was using an RC4 key embedded in the binary.
How did the malware behind the botnet interfere with the operating system’s functionality?
Wauchos was interfering with the operating system in many ways. Among other things, it was attempting to disable Windows Firewall, Windows Update and User Account Control functions.
Did Wauchos use any anti-VM or anti-sandbox techniques?
As this malware family was for sale in underground forums, different cybercriminals were using different techniques, but yes, we saw samples employing anti-VM and anti-sandbox techniques.
Is there any way to determine how successful the rootkit plugin was in concealing the infestation?
Not really.
Based on your experience with botnet disruptions, what do you think lies in store for Wauchos now that it’s been obstructed?
It will probably slowly disappear as remediation is under way. For this type of long-lived botnet, it is very hard to clean all the systems that have been compromised by Wauchos, but as long as the good guys are in control of the C&C servers, at least no new harm can be done to those compromised PCs.
Generally speaking, what symptoms might alert everyday users that their computers have been ensnared into a botnet?
Depending on the malware family, it can be difficult to recognize that your computer is compromised. If you notice weird behavior from your computer such as – but not limited to – your security solution being disabled or no longer able to update itself, or if you realize that you are not receiving the normal Windows updates, malware might be the culprit. Using free tools such as ESET’s Online Scanner to scan your system can help to find and remove malware that might be causing these issues.
How can one make sure one’s computer doesn’t end up being part of a botnet?
Most of the common malware families are using old tricks and cannot install themselves without some help from incautious users. The usual recommendations of not clicking on random links or not opening attachments coming from untrusted sources go a long way towards staying safe on the internet.

Now is the best time to craft your breach response



I hope you’re reading this at a time when you’re not in the midst of a response to an actual breach, but rather for your own edification, during a time of relative peace and quiet. If people are out there doing internet searches on “what to do after a breach” to learn what to do after experiencing a dire emergency, I suspect computer security problems are merely one symptom of their professional woes. Whether or not you’ve yet been hacked, the best time to start designing and practicing your breach response is long before an attack has been discovered. There’s no time like the present to get started preparing for an emergency.
After perusing the recent Ernst & Young Global Information Security Survey it was apparent to me that being unprepared for data breaches is a very common problem for all sorts of organizations. According to the survey’s respondents, 56 percent say either that they have made changes to their business strategies to take account of the risks posed by cyberthreats, or that they are about to review strategy in this context. However, only four percent of organizations are confident they have fully considered the information security implications of their current strategies and that their risk landscape incorporates all relevant risks and threats. While this may in part speak to the complexity of the threat landscape, this shows how many organizations feel completely overwhelmed by the enormity of the task.
Indeed, 35 percent of the survey’s respondents describe their data protection policies as ad-hoc or non-existent.  Although most organizations do have some processes in place for determining if they’ve been attacked – only 12 percent had no breach detection program in place – many organizations may be confused about their legal responsibilities: 17 percent of respondents say they would not notify all customers, even if a breach affected customer information, and 10 percent would not even notify customers impacted. There are few countries where this would not result in potentially catastrophic regulatory or legal fines, not to mention loss of customer loyalty.
The most moral, ethical and logical way to deal with risk is not to keep quiet about it and hope no one notices. To horribly modify the old adage for our purposes; the best way to eat a whale is to do it one bite at a time, not to try to hide it under the carpet until the stinking carcass causes everyone to flee.
Taking time to think logically and deliberately about your assets can help you determine what needs to be secured. Preparing for the worst can help you see the best course of action to prevent those emergencies in the present.
“Creating a template response in advance will allow emergency responders to focus on providing accurate and timely information”
I’m sure we’ve all seen some variation on the theme of Public Service Announcements where we’re encouraged to prepare a kit full of things that are useful in an emergency, whether that’s fire or earthquakes or our car breaking down in a snowstorm. While data breaches may be somewhat less “life or death” than any of these situations, that does not mean we should postpone dealing with them until we’re in the midst of an emergency.
As we have just said farewell to 2017, we have to admit that the last year has brought plenty of painful examples of companies responding sub-optimally to their own breach events, which made the reputational consequences much more severe. As with any sort of crisis, the more information and awareness you have going into the crisis, the less overwhelming and painful it is to get past it. This holds true whether you’re the primary target of the attack or a customer whose information was stolen.
Here are a few things to gather when planning your breach preparedness kit:
Make a list of steps to take and keep it updated
This list is analogous to the information you would give to a babysitter. Who needs to be contacted in case of emergency, and in what order? What actions need to be accomplished, in what specific circumstances? This post by my esteemed colleague Denise Giusto Bilić can help you understand the types of actions that need to be completed, which you can then tailor to the needs of your own organization.
That list needs to be updated regularly so that you’re not giving instructions for processes that no longer exist, or asking emergency responders to contact someone who has moved on to another position, who has left the company, or is on vacation. It needs to be kept (encrypted, to keep it from thieves’ prying eyes, please!) somewhere that is easy to find and revise, so people don’t have to spend precious time scrambling to unearth it.
Informational messaging
Unsurprisingly, messaging that announces bad news is a very delicate and sensitive task. This is maybe not a task you want to delegate to someone in the midst of a chaotic situation, and it is definitely something you should be creating in consultation with your legal department or an attorney who has experience in Data Breach Notification law. Creating a template response in advance will allow emergency responders to focus on providing accurate and timely information.
Many companies err on the side of waiting to notify people until investigations are over, which tends to leave customers feeling quite resentful. Even before you have all the information about what has occurred, you can let people know that there has been a problem so that they can take steps to protect themselves. Don’t underestimate the power of the warm fuzzies that can be gained by regular updates to your affected customers, even if those missives don’t provide much in the way of new information. Suffice it to say it’s a good idea to run any text by an editor so you don’t end up sending something out that still has place-holder text.
Remember that customers often see data breaches as a breach in trust; you need to keep them updated regularly with current information as a part of rebuilding that trust.
Breach response website
“As with any sort of crisis, the more information and awareness you have going into the crisis, the less overwhelming and painful it is to get past it”
As with a message template, it’s a good idea to have a webpage set up and stored (almost) ready to go, so that most of the heavy lifting is already done. This will save time and reduce potential errors, since you can thoroughly check and test code and assess the clarity of your text at a time pre-breach when people are still presumably calm and collected. Whether you choose to use a whole separate domain or just a page on your existing site, make this decision beforehand and communicate it clearly when an emergency arises. It is a good idea to keep the URL fairly short so that it can be easily sent on a variety of different messaging platforms, or read on short radio or television clips.  It is probably a good idea to register any domains that sound similar or might be mis-typed in order to reduce phishing and scams by criminals.
Customer protection measures
After data breaches, companies often offer improved security measures to their customers, to help mitigate any harm that might have been caused. In the case of credit monitoring, it does make sense to offer this only after an attack has occurred. But if you are prepared to consider offering something like improved authentication options after a breach, you can save yourself the significant cost of reputation loss by adding those options before a problem happens. Implementing and then advertising your use of security- and privacy-enhancing measures can be a market differentiator to improve brand loyalty. Most people may not understand Salting & Hashing or Network Segmentation, but they will appreciate knowing that no one else can access their passwords and other sensitive information.
Test your policies and procedures
Once or twice a year, test your data breach response program by simulating an incident, and go through the steps of responding to a mock-incident, short of actually notifying customers and other external organizations. Some businesses already do this in concert with crisis management consultants. Injecting some scenarios from case-studies of other companies’ data breaches can make yours more realistic and help better prepare your business. Keep in mind that these tests will likely prompt you to consider making changes in your policies and procedures; in fact, it is desirable to make (and thoroughly re-test!) thoughtful modifications that suit your environment. When you put such ideas into practice, you may find ways to make your emergency response more effective and efficient as well.
No business is too big or too small to be a target of attacks. If you have any sort of information that is of value to anyone – whether or not you understand how that data can be monetized or weaponized – there is a criminal out there who would be happy to