Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Make Big Bucks Distributing Malware (But Don't)

It turns out that with a really large-scale Internet attack, it's not effective to protect every PC or other endpoint. Instead, you infiltrate the attacker and defeat it from within.

By Neil J. Rubenking
October 21, 2015
PCMag.com

Vern Paxson, Professor of Electrical Engineering and Computer Sciences at the University of California, Berkeley, is famed in the security community for a 2002 paper titled How to Own the Internet in Your Spare Time (among many other feats). Based on a detailed analysis of the Code Red and Nimda worms, the paper promoted the need for a Cyber "Center for Disease Control." These days, Paxson is looking at a different mode for handling large scale security problems—infiltration. His keynote at the 10th International Conference on Malicious and Unwanted Software (MalCon 2015 for short) impressed me and the attendees with the straightforwardness of this approach.

Make Big Bucks in Your Spare Time
Want to make big bucks in the malware industry? You don't have to be a coder. Even if you have those skills, you don't have to learn all aspects of creating and distributing malware. There are various different jobs in the malware ecosystem.

The key figure in this ecosystem is the broker, the guy who knows business but not coding. He has two kinds of customers. Malware coders have nasty software that they'd like to get installed on many consumer PCs. It could be fake antivirus, ransomware, botnet components, just about anything. Then there are the affiliates, coders who have the resources to get arbitrary software installed on unprotected systems. They use techniques like drive-by downloads, spam, and phishing to inflict a downloader on victim systems.

Now the wheels start turning. Malware coders contract to pay the broker for getting their code installed on as many systems as possible. The affiliates get downloaders installed on as many systems as possible. The downloader contacts the broker, who supplies malware from the coders, probably multiple instances. And the affiliates get paid based on the number of installations. Everybody makes a buck in this Pay Per Install (PPI) system, and these networks are huge.

PCMag.com

"There are a couple of brilliances here," said Paxson. "The broker doesn't do anything, doesn't break in, doesn't figure out exploits. The broker is just a middleman, taking profits. Affiliates don't have to negotiate with baddies or know what to do after breaking in. All of the members just have to do their part."

Bad Guys Have Bad Security
"Historically, detection of network attacks has been a game of whack-a-mole," noted Paxson. Smack down one attack, another pops up. It's not a game you can win.

His team tried a different approach against this PPI system. They captured samples of various downloaders and reverse-engineered them to determine how they communicate with their respective brokers. Armed with this information, they devised a system to blast the broker with requests for downloadable malware. Paxson calls this technique "milking" the malware broker.

"You'd think this would fail," said Paxson. "Surely the broker has some kind of authentication system, or rate-limiting?" But as it turns out, they don't. "The cybercrime elements that are not malware-facing are ten years behind in their own security, maybe fifteen," he continued. "They are customer-facing, not malware-facing." There is a second interaction by which the affiliate claims credit for the download; Paxson's team naturally skipped that step.

In five months, the experiment milked out a million binaries, representing 9,000 distinct malware families, from four affiliate programs. Correlating this with a list of the 20 most common malware families, the team determined that this kind of distribution could conceivably be the number one vector for malware distribution. "We found our samples were about a week ahead of VirusTotal," said Paxson. "We are getting it fresh. As soon as the brokers want to push it out, we are getting it. Once it's on VirusTotal you don't push it."

What Else Can We Infiltrate?
Paxson's team also took on websites that sell working accounts for many different services. He noted that the accounts are completely valid, and not precisely illegal, because "their only offense is violating Terms of Service." Facebook and Google cost the most per thousand, because they require phone verification. Twitter accounts aren't quite as expensive.

With Twitter's permission, the research group bought a large collection of fake accounts. By analyzing the accounts, including metadata supplied by Twitter, they developed an algorithm for detecting accounts created using the same automated registration technique, with 99.462% accuracy. Using this algorithm, Twitter took down those accounts; the next day, the account-selling websites had to announce they were out of stock. "It would have been better to terminate the accounts on first use," noted Paxson. "That would have created confusion and actually undermined the ecosystem."

You've surely gotten spam offering to sell you male performance supplements, "real" Rolexes, and such. The thing they have in common is that they actually have to accept payment and ship you the product. There are tons of links involved in getting the spam into your Inbox, handling your purchase, and getting the product to you. By actually purchasing some legal items, they found that the weak link in this system was getting the credit card transaction cleared. "Rather than try to disrupt the spam-spewing botnet," said Paxson, "we rendered it not useful." How? They convinced the credit card provider to blacklist three banks, in Azerbaijan, Latvia, and St. Kitts and Nevis.

So what's the takeaway? "With a really large scale Internet attack," Paxson said, "there's no easy way to prevent infiltration. Infiltration is significantly more effective than trying to protect each endpoint."

MalCon is a very small security conference, around 50 attendees, that brings academics, industry, press, and government together. It's backed by Brandeis University and the Institute of Electrical and Electronics Engineers (IEEE), among others. This year's sponsors include Microsoft and Secudit. I've seen a number of papers from MalCon appear a few years later, with more mature research, at the Black Hat conference, so I pay close attention to what's presented here.

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Neil J. Rubenking

Lead Analyst for Security

When the IBM PC was new, I served as the president of the San Francisco PC User Group for three years. That’s how I met PCMag’s editorial team, who brought me on board in 1986. In the years since that fateful meeting, I’ve become PCMag’s expert on security, privacy, and identity protection, putting antivirus tools, security suites, and all kinds of security software through their paces.

Before my current security gig, I supplied PCMag readers with tips and solutions on using popular applications, operating systems, and programming languages in my "User to User" and "Ask Neil" columns, which began in 1990 and ran for almost 20 years. Along the way I wrote more than 40 utility articles, as well as Delphi Programming for Dummies and six other books covering DOS, Windows, and programming. I also reviewed thousands of products of all kinds, ranging from early Sierra Online adventure games to AOL’s precursor Q-Link.

In the early 2000s I turned my focus to security and the growing antivirus industry. After years working with antivirus, I’m known throughout the security industry as an expert on evaluating antivirus tools. I serve as an advisory board member for the Anti-Malware Testing Standards Organization (AMTSO), an international nonprofit group dedicated to coordinating and improving testing of anti-malware solutions.

Read Neil J.'s full bio

Read the latest from Neil J. Rubenking