Pushdo botnet is evolving, becomes more resilient to takedown attempts

A new Pushdo malware variant uses domain generation techniques to call home if normal communications fail, researchers say

Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts.

The Pushdo Trojan program dates back to early 2007 and is used to distribute other malware threats, like Zeus and SpyEye. It also comes with its own spam engine module, known as Cutwail, which is directly responsible for a large portion of the world's daily spam traffic.

The security industry has tried to shut down the Pushdo/Cutwail botnet four times during the last five years, but those efforts only resulted in temporary disruptions.

In March, security researchers from Damballa identified new malicious traffic patterns and were able to trace them back to a new variant of the Pushdo malware.

"The latest variant of PushDo adds another dimension by using domain fluxing with Domain Generation Algorithms (DGAs) as a fallback mechanism to its normal command-and-control (C&C) communication methods," the Damballa researchers said Wednesday in a blog post.

The malware generates over 1,000 non-existent unique domain names every day and connects to them if it cannot reach its hard-coded C&C servers. Since the attackers know how the algorithm works, they can register one of those domains in advance and wait for the bots to connect in order to deliver new instructions.

This technique is intended to make it hard for security researchers to shut down the botnet's command-and-control servers or for security products to block its C&C traffic.

"PushDo is the third major malware family that Damballa has observed in the last 18 months to turn to DGA techniques as a means of communicating with its C&C," the Damballa researchers said. "Variants of the ZeuS malware family and the TDL/TDSS malware also use DGA in their evasion methods."

Researchers from Damballa, Dell SecureWorks and the Georgia Institute of Technology worked together to investigate the malware's new variant and measure its impact. Their findings were published in a joint report released Wednesday.

In addition to using DGA techniques, the latest Pushdo variant also queries over 200 legitimate websites on a regular basis in order to blend in its C&C traffic with normal-looking traffic, the researchers said.

During the investigation, 42 domain names generated by Pushdo's DGA were registered and the requests made to them were monitored in order to get an estimation of the botnet's size.

"Over the period of almost two months, we observed 1,038,915 unique IPs posting C&C binary data to our sinkhole," the researchers said in their report. The daily count was between 30,000 to 40,000 unique IP (Internet Protocol) addresses, they said.

The countries with the highest infection count are India, Iran and Mexico, according to the collected data. China, which is usually at the top of the list for other botnet infections, is not even in the top ten, while the U.S. is only in sixth place.

The Pushdo malware is generally distributed through drive-by download attacks -- Web-based attacks that exploit vulnerabilities in browser plug-ins -- or is installed by other botnets as part of pay-per-install schemes used by cybercriminals, the researchers said.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags DellsecurityDamballamalware

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Essentials

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Michael Hargreaves

Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

HP Spectre

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Lenovo Yoga

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?