2019 Q2 Spamhaus Botnet Threat Update
2019 Q2 Spamhaus Botnet Threat Update
Q2–2019
Two new credential stealers and a dropper that has been around
the block have all made it onto our Top 20 list for malware families
associated with botnet C&C listings. When it comes to the most
abused registrar, ‘register.com’ has dropped off the Top 20 list,
meanwhile, Cloudflare continues to host more botnet C&Cs than
any other Internet Service Provider (ISP).
2 | B OT N E T T H R E AT UPDAT E Q2 –20 19
Spotlight
Free DNS provider OpenNIC drops ‘.bit’ zone
Decentralized top-level domains
(dTLDs)
In this quarter we’re putting the spotlight on the free DNS These are independent top-level domains
provider OpenNIC. that are not under the control of ICANN.
Unlike official TLDs like ‘.com’ or ‘.net’,
OpenNIC is one of the larger free DNS providers that support the resolution dTLDs cannot be resolved through the
of decentralized top-level domains (dTLDs). In last year’s annual Spamhaus public DNS infrastructure. A user or an
Botnet Threat Report 1 we raised concerns about the increase in the amount adversary that wants to resolve a domain
of botnet C&C domains that were registered with dTLDs. name registered within a dTLD must use
a special DNS server that is configured
From an adversary’s perspective, using a dTLD for hosting botnet C&C appropriately to resolve dTLDs.
servers has several advantages:
"" These domain names cannot be taken down or suspended when being
used for malicious purposes, because there is no governing body
associated with a dTLD.
"" dTLDs bypass DNS Firewalls/Response Policy Zones (RPZ) that
numerous ISPs and businesses use to protect their customers/users
from cyber threats.
"" Researching malicious activity becomes more challenging as domain
name registrations within dTLDs are usually entirely anonymous, with
registrant information not being required.
These factors, as previously stated, have led to an increase in the number
of new dTLD registrations being used to host botnet C&C servers, in
particular, Namecoin’s dTLD ‘.bit.’ Until recently, malware authors were
heavily reliant on OpenNIC to resolve their botnet C&C domain names.
In June 2019, the operator of OpenNIC took a vote as to whether they
should drop the support for NameCoin’s ‘.bit.’2
“Over the past year .bit domains have started being used as malware hubs
due to their anonymous nature. Since there is no way to contact the owner
of those domains, it creates a backscatter effect and a number of people
running public T2 servers have seen domains blacklisted, emails blocked,
and shutdown notices from their providers.”
86% of OpenNIC’s volunteers voted in favor of this proposal. On June 25th,
2019, OpenNIC dropped Namecoin’s ‘.bit’ domains from their zones. For
malware families that purely relied on OpenNIC to resolve their ‘.bit’ botnet
C&C domain names they have been dismantled and infected devices are no
longer under the control of the miscreants.
https://spamhaus-cdn.s3.amazonaws.com/uploads/2019/02/Spamhaus-Botnet-Threat-Report-2019-1.pdf
1
https://wiki.opennic.org/votings/drop_namecoin
2
3 | B OT N E T T H R E AT UPDAT E Q2 –20 19
1,500
1,200
900
1,103
600
1,297
955
1,179
Jan
1,146
Feb
Mar 826
Apr
May
Jun
2
8
10 6 9
5
15
3 12 16
19
1 7 13
18 4
20
17
14
11
0
7
2
15
13
13
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 20 Smoke Loader Dropper/Backdoor
https://krabsonsecurity.com/2019/02/13/analyzing-amadey-a-simple-native-malware/
3
4
https://blog.malwarebytes.com/threat-analysis/2019/04/say-hello-baldr-new-stealer-market/
6 | B OT N E T T H R E AT UPDAT E Q2 –20 19
3 cm ccTLD of Camaroon
1,
4 net gTLD
1,500 5 info gTLD
6 org gTLD
7 pw ccTLD of Palau
8 xyz gTLD
9 top gTLD
1,000 10 tk originally ccTLD, now effectively gTLD
11 eu ccTLD of the European Union
12 ml originally ccTLD, now effectively gTLD
1
73
5
67
3
61
16 icu gTLD
17 site gTLD
4
24
4
8
21
8
19
17
18
1
name gTLD
6
15
8
14
8
12
11
89
72
66
19 in ccTLD of India
59
63
57
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 20 club gTLD
7 | B OT N E T T H R E AT UPDAT E Q2 –20 19
16 west263.com China
17 CentralNic United Kingdom
3
26
6
8
20
18
5
1
1
5
2
11
10
10
99
74
52
53
47
43
0
20 Crazy Domains Australia
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
8 | B OT N E T T H R E AT UPDAT E Q2 –20 19
6 alibaba-inc.com China
7 ispserver.com Russia
400 8 timeweb.ru Russia
9 itos.biz Russia
10 spacenet.ru Russia
300 11 dhub.ru Russia
12 stajazk.ru Russia
13 m247.ro Romania
3
20
15 marosnet.ru Russia
15
6
13
16 gerber-edv.net Bulgaria
2
0
11
11
100
94
17 anmaxx.net Russia
83
76
67
61
58
57
55
53
Thanks for reading. We’ll see you again in October for Q3’s update.
www.spamhaus.org @spamhaus