Featured Articles

Snapdragon 400 is Qualcomm’s SoC for watches, wearables

Snapdragon 400 is Qualcomm’s SoC for watches, wearables

We wanted to learn a bit more about Qualcomm's plans for wearables and it turns out that the company believes its…

More...
Qualcomm sampling 20nm Snapdragon 810

Qualcomm sampling 20nm Snapdragon 810

We had a chance to talk to Michelle Leyden-Li, Senior Director of Marketing, QCT at Qualcomm and get an update on…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 28 August 2013 11:14

Kelihos is a new spin on an old threat

Written by Nick Farrell

Uses legitimate sources to gather intelligence

Chris Mannon, security researcher at Zscaler ThreatLabZ is warning that the Kelihos botnet is using some natty technology which puts new spin on an old threat.

Kelihos is a botnet which utilises P2P communication to maintain its command and control network and it apparently be picked up 30/45 AV vendors. Mannon had a look at the installer and found a file called "rasta01.exe". The file uses P2P style communication via SMTP. This particular instance called out to 159 distinct IP addresses. The botnet overtly installs several packet capturing utilities and services. This is done so that the infection can monitor ports 21, 25, and 110 for username and password information.

The botnet attempts to categorise it's new victim by using legitimate services to gather intelligence. In this instance, the malicious file actually queried the victim IP address on Barracuda Networks, SpamHaus, Mail-Abuse, and Sophos.

These services primarily exist to notify users of abuse seen on the site or IP address. Kelihos is using it to to determine if the new victim is already seen as malicious or not. If the victim isn't seen in the Composite Block Lists yet, then it may be used as either a Proxy C&C or Spam-bot.

The botnet makes no attempt to hide exactly how loud it is regarding network activity. We noted a spike in TCP traffic across a distinct 563 IP addresses in the span of two minutes. He warned network administrators should take extra care in monitoring users with anomalous levels of traffic. A single node giving off so much traffic to different services in such a small window could be used to identify potential victims, Mannon wrote.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments