Menu
Microsoft legal action cramping other hacking campaigns, Kaspersky says

Microsoft legal action cramping other hacking campaigns, Kaspersky says

A variety of other sophisticated hacking campaigns used No-IP's infrastructure

Microsoft's seizure of domains from a DNS service provider has also disrupted some state-sponsored cyberespionage campaigns, according to security vendor Kaspersky Lab.

A quarter of the long-term malware operations run by hacking groups tracked by the Russian security vendor have been affected by the seizure of domains from No-IP, wrote analyst Costin Rau on a company blog Tuesday.

No-IP, run by Nevada-based Vitalwerks, has a free "dynamic DNS" service that updates DNS entries for a domain that has a changing IP address assigned by an ISP. It does that by lending a subdomain to the customer, then updating the DNS record as the IP address for the hostname changes.

With a federal court order, Microsoft seized 22 domains used by No-IP for its service on Monday, alleging two men in Algeria and Kuwait used No-IP's service as part of the infrastructure for a botnet. It alleged no wrongdoing by No-IP but said it was lax in responding to abuse.

Microsoft alleged the men used No-IP to create points of contact for infected machines in order to receive instructions. The command-and-control infrastructure for their alleged operation had dynamic IP addresses, according to the civil lawsuit.

Microsoft "sinkholed" those domains, blocking the malicious traffic, although it made a technical error and cut off some of No-IP's legitimate customers.

Although Microsoft was taking aim at two malware families called Bladabdindi and Jenxcus that employed No-IP, Rau wrote the seizure has had a larger impact on so-called APT (advanced persistent threat) campaigns, which are long-running infiltration operations often run by nation states.

Computers used in these campaigns "are now pointing to what appears to be a Microsoft sinkhole," Rau wrote.

The malware includes Flame, which was found on computers in Iran and other Middle Eastern countries, and the Italian company Hacking Team's Remote Control System, which is spying software intended for use by law enforcement.

Other malware that may be affected include Turla/Snake/Urobos/Epic, Cycldek, Shiqiang, Banechat and Ladyoffice, Rau wrote.

Hacking groups are now likely to be more careful when using dynamic DNS providers and rely more on hacking websites and direct IP address changes to manage their command-and-control infrastructure, Rau wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags CriminalMicrosoftsecuritylegalmalwarecybercrimekaspersky lab

Featured

Slideshows

Reseller News launches inaugural Hall of Fame lunch

Reseller News launches inaugural Hall of Fame lunch

Reseller News welcomed 2015 and 2016 inductees - Darryl Swann, Dave Rosenberg, Gary Bigwood, Keith Watson, Mike Hill and Scott Green - to the inaugural Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed how the channel can collectively work together to benefit New Zealand, the Kiwi skills shortage and the future of the industry. Photos by Maria Stefina.

Reseller News launches inaugural Hall of Fame lunch
Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Show Comments