Menu
Microsoft legal action cramping other hacking campaigns, Kaspersky says

Microsoft legal action cramping other hacking campaigns, Kaspersky says

A variety of other sophisticated hacking campaigns used No-IP's infrastructure

Microsoft's seizure of domains from a DNS service provider has also disrupted some state-sponsored cyberespionage campaigns, according to security vendor Kaspersky Lab.

A quarter of the long-term malware operations run by hacking groups tracked by the Russian security vendor have been affected by the seizure of domains from No-IP, wrote analyst Costin Rau on a company blog Tuesday.

No-IP, run by Nevada-based Vitalwerks, has a free "dynamic DNS" service that updates DNS entries for a domain that has a changing IP address assigned by an ISP. It does that by lending a subdomain to the customer, then updating the DNS record as the IP address for the hostname changes.

With a federal court order, Microsoft seized 22 domains used by No-IP for its service on Monday, alleging two men in Algeria and Kuwait used No-IP's service as part of the infrastructure for a botnet. It alleged no wrongdoing by No-IP but said it was lax in responding to abuse.

Microsoft alleged the men used No-IP to create points of contact for infected machines in order to receive instructions. The command-and-control infrastructure for their alleged operation had dynamic IP addresses, according to the civil lawsuit.

Microsoft "sinkholed" those domains, blocking the malicious traffic, although it made a technical error and cut off some of No-IP's legitimate customers.

Although Microsoft was taking aim at two malware families called Bladabdindi and Jenxcus that employed No-IP, Rau wrote the seizure has had a larger impact on so-called APT (advanced persistent threat) campaigns, which are long-running infiltration operations often run by nation states.

Computers used in these campaigns "are now pointing to what appears to be a Microsoft sinkhole," Rau wrote.

The malware includes Flame, which was found on computers in Iran and other Middle Eastern countries, and the Italian company Hacking Team's Remote Control System, which is spying software intended for use by law enforcement.

Other malware that may be affected include Turla/Snake/Urobos/Epic, Cycldek, Shiqiang, Banechat and Ladyoffice, Rau wrote.

Hacking groups are now likely to be more careful when using dynamic DNS providers and rely more on hacking websites and direct IP address changes to manage their command-and-control infrastructure, Rau wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securityMicrosoftcybercrimemalwarelegalkaspersky labCriminal

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments