{"id":3831,"date":"2015-04-13T14:40:29","date_gmt":"2015-04-13T14:40:29","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3831"},"modified":"2019-11-15T07:05:38","modified_gmt":"2019-11-15T12:05:38","slug":"simda-botnet-a-stealthy-malware-waiter","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/simda-botnet-a-stealthy-malware-waiter\/3831\/","title":{"rendered":"Simda botnet: a stealthy malware &#8220;waiter&#8221;"},"content":{"rendered":"<p>A peculiar botnet codenamed Simda has been taken down as a result of a joint operation between a number of law enforcement agencies and commercial organizations. Spearheaded by Interpol, the operation involved a large circle of participants including TrendMicro, Kaspersky Lab, the Cyber Defense Institute, officers from the Dutch National High Tech Crime Unit (NHTCU), the FBI, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior\u2019s Cybercrime Department \u201cK\u201d.<\/p>\n<p>14 C&amp;C servers in the Netherlands, USA, Luxembourg, Poland and Russia had been taken down at once. Preliminary analysis of some of the sinkholed server logs revealed a list of 190 countries affected by the Simda botnet.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Simda #botnet: a stealthy malware \u201cwaiter\u201d<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fb5U5&amp;text=Simda+%23botnet%3A+a+stealthy+malware+%26%238220%3Bwaiter%26%238221%3B\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The botnet itself caused some head-scratching among experts. Despite being apparently relatively large (up to 770 thousands infected PCs), it was also very stealthy and evasive. It rarely appeared on \u201cradars\u201d, apparently due to its ability to detect security tools, as well as emulation and virtual machines. Also a server-side polimorphism had been reported as well as the limited lifetime of the bots.<\/p>\n<p>The latter is especially interesting. Simda\u2019s main purpose seems to be distributing other malware to certain machines.<\/p>\n<p>\u201cThis criminal business model opens up the possibility of exclusive malware distribution. This means that the distributors can guarantee that only the client\u2019s malware is installed on infected machines,\u201d writes Vitaly Kamluk at Securelist.<\/p>\n<p>Simda can deactivate itself after a short while: that means that Simda acts as some sort of \u201cwaiter\u201d \u2013 it comes, \u201cserves\u201d the malware and walks away quietly.<\/p>\n<p>Simda\u2019s bots were\u00a0distributed by a number of infected websites that redirected to exploit kits. They were also downloading and running additional components from their\u00a0own update servers and were\u00a0capable of modifying the system host\u2019s file. The once-infected machines can\u00a0keep sending out HTTP requests to malicious servers, signaling that they are possibly still vulnerable to reinfection with the same exploit kits.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Simda #botnet\u2019s purpose was to serve out the 3rd party #malware<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fb5U5&amp;text=%23Simda+%23botnet%26%238217%3Bs+purpose+was+to+serve+out+the+3rd+party+%23malware\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>\u201cThe criminals could use the same exploits to re-infect the machines and sell them all over again \u2013 perhaps even \u2018exclusively\u2019 to the original client,\u201d Kamluk writes.<\/p>\n<p>Evasiveness and the obvious \u201ccommercial\u201d purpose of the botnet shows that the cybercriminals learned their lessons and tried hard to make their operations as clandestine as possible.<\/p>\n<p>Not quite successfully this time, however: the botnet still had been taken down, but not before it infected a large number of the machines and spurred world-leading software and security tool vendors to enact a joint action with LEAs.<\/p>\n<p>Thanks to the sinkhole operation and data sharing between partners, a number of checkup resources had been establish so that users could test their IP for whether it had been connected to Simda any time in the past. Click on the image below to check, whether you have been infected.<\/p>\n<p>A more detailed report on the matter is available at Securelist. Additional technical information about the botnet and its takedown is available in the INTERPOL <a href=\"http:\/\/www.interpol.int\/en\/News-and-media\/News\/2015\/N2015-038\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">press-release<\/a> and at <a href=\"http:\/\/blogs.technet.com\/b\/mmpc\/archive\/2015\/04\/12\/microsoft-partners-with-interpol-industry-to-disrupt-global-malware-attack-affecting-more-than-770-000-pcs-in-past-six-months-39-simda-at-39-designed-to-divert-internet-traffic-to-disseminate-other-types-of-malware.aspx\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft\u2019s Technet blog<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A peculiar botnet codenamed Simda has been taken down as a result of a joint operation between a number of law enforcement agencies and commercial organizations.<\/p>\n","protected":false},"author":209,"featured_media":15709,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[205,2299,1059,2300],"class_list":{"0":"post-3831","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-botnets","10":"tag-lea","11":"tag-simda","12":"tag-takedown"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/simda-botnet-a-stealthy-malware-waiter\/3831\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/simda-botnet-a-stealthy-malware-waiter\/3831\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/simda-botnet-a-stealthy-malware-waiter\/3831\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/botnets\/","name":"botnets"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3831"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3831\/revisions"}],"predecessor-version":[{"id":30516,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3831\/revisions\/30516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15709"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}