Glupteba: On December 2021, Google took action to disrupt Glupteba botnet, a sophisticated botnet which targets Windows machines and protects itself using blockchain technology. Google’s Threat Analysis Group (TAG) took steps to detect and track Glupteba’s malicious activity over time. The Glupteba botnet involved approximately one million compromised Windows devices worldwide, and at times, grew at a rate of thousands of new devices per day. Glupteba is notorious for stealing users’ credentials and data, mining cryptocurrencies on infected hosts, and setting up proxies to funnel other people’s internet traffic through infected machines and routers. It is also offers a group of underground cybercrime-as-a-service offering.
These services include selling access to virtual machines loaded with stolen credentials (dont[.]farm), proxy access (awmproxy), and selling credit-card numbers (extracard) to be used for other malicious activities such as serving malicious ads and payment fraud on Google Ads.
Details: Threat actors behind this malware strain are mainly distributing payloads onto targeted devices via pay-per-install (PPI) networks and traffic purchased from traffic distribution systems (TDS) camouflaged as "free, downloadable software, videos, or movies." After infecting a host, it can mine for cryptocurrency, steal user credentials and cookies, and deploy proxies on Windows systems and IoT devices, which later get sold as 'residential proxies' to other cybercriminals. It also has the capability to download other modules.
The downloaded modules, besides incorporating measures to keep it invisible to detection by antivirus solutions, are designed to execute arbitrary commands pushed by an attacker-controlled server. Glupteba is also notable for the fact that unlike other traditional botnets, the malware leverages the Bitcoin blockchain as a backup command-and-control (C2) system.
"Unfortunately, Glupteba's use of blockchain technology as a resiliency mechanism is notable here and is becoming a more common practice among cyber crime organizations," Google's Royal Hansen and Halimah DeLaine Prado said "The decentralized nature of blockchain allows the botnet to recover more quickly from disruptions, making them that much harder to shutdown." Unfortunately, the operators of Glupteba are likely to attempt to regain control of the botnet using a backup command and control mechanism that uses data encoded on the Bitcoin blockchain.
Additional Information: The cryptojacking crew were also apparently heavy users of Google’s free cloud hosting services. Below are some of the actions Google took to disrupta the Glupteba groups activities:
* Disabled 1,183 Google Accounts associated Glupteba * Identified 908 Cloud Projects hosting malicious files linked to the group * Removed 63 million Google Docs with malicious elements linking to the Glupteba malware * Took over Glupteba's key command and control (C2) infrastructure * Seized 42 domains used by the China-based Nickel hacking group (aka APT15, Bronze Palace, Ke3Chang, Mirage, Playful Dragon, and Vixen Panda) * Announced a lawsuit against two Russian individuals and 15 unnamed defendants.
References: a. hxxps://blog[.]google/threat-analysis-group/disrupting-glupteba-operation/ b. hxxps://www[.]cpomagazine.com/cyber-security/google-disrupts-glupteba-cryptojacking-botnet-with-removal-of-hosted-ads-documents-and-accounts-notifications-to-web-hosts/ c. hxxps://www[.]washingtonpost.com/technology/2021/12/07/google-glupteba-botnet-hack/ d. hxxps://threatpost[.]com/google-glupteba-botnet-lawsuit/176826/ e. hxxps://thehackernews.com/2021/12/google-disrupts-blockchain-based.html f. hxxps://github[.]com/sophoslabs/IoCs/blob/master/Trojan-Glupteba