FBI disrupts multiple botnets as part of anti-fraud operation
An FBI-led takedown has disrupted a large multiyear scam that saw cyber criminals use botnets to manipulate internet traffic from 1.7 million IP addresses and generate nearly 30 million dollars in fraudulent ad revenue.
F-Secure supported the takedown operation by providing threat intelligence on the scam’s malware campaigns and botnets.
The ad fraud ring, dubbed “3ve, in an advisory published by US-CERT, built two different botnets by spreading Kovter and Boaxxe malware to individuals through spam emails and drive-by downloads.
3ve used these botnets to manipulate internet traffic and direct it to ads they ran under the pretence that the traffic was from real visitors.
Estimates suggest 3ve’s botnets allowed them to manipulate internet traffic from as many as 1.7 million IPs at once.
The takedown, described yesterday in a news release from the US Department of Justice, saw the FBI search 89 servers and sinkhole 31 domains to disrupt the botnets, and seize bank accounts connected with the group.
The operation led to multiple charges being laid against eight individuals.
F-Secure played a supporting role in the FBI-led effort by exposing parts of 3ve’s botnets and malware campaigns for the authorities.
F-Secure researcher Paivi Tynninen says, “3ve blasts out failed delivery notification spam, which is a common attack vector these days. Users open an attachment or click a link and end up infected with Kovter, Boaxxe or even both.”
“3ve also uses malvertising that redirects users to fake software updates and tricks victims into installing Kovter, which is a fairly popular social engineering tactic.”
3ve used the Boaxxe botnet as a proxy for fraudulent ad requests sent from their own data centre in Germany.
The Kovter botnet was a network of infected PCs that ran a hidden browser from users, which 3ve used to discreetly direct traffic toward their ads.
Fabricating internet traffic with these botnets helped 3ve convince buyers their ads were being viewed by countless numbers of people.
It’s a type of fraud that many don’t realise is happening, but it’s actually a fairly prevalent type of cyber crime.
A 2016 report from the World Federation of Advertisers projected that ad fraud revenues could balloon to anywhere between 50 to 150 billion dollars per year by 2025.
“Ad fraud might not feel like a very pressing issue. But it costs a lot of businesses a lot of money, and those costs eventually get fed back to consumers,” says F-Secure security advisor Sean Sullivan.
“That makes these kinds of takedown operations beneficial to not just companies or advertisers, but pretty much everyone.”
While the takedown successfully disrupted 3ve’s operations, the persistent nature of today’s botnets makes it difficult to say for certain whether or not 3ve is gone for good.
Sullivan says that even though many organisations contributed to the operation, they need help from individual PC users to ensure 3ve can’t bounce back.
“Most modern botnets have pretty sophisticated backends that are extremely resistant to takedown attempts. Infected PCs can be used to begin rebuilding, so it’s really important that individuals check their PCs and remove the malware if they discover an infection,” says Sullivan.