Botnets now routinely using P2P to evade detection, says Damballla

Traffic grows fivefold

Several of the Internet's most dangerous malware threats are now routinely using peer-to-peer (P2P) command and control in an effort to evade the detection and shutdown that has affected many conventional botnets, security firm Damballa has said.

The P2P tactic has been around for several years but the company had noticed a fivefold increase in the number of malware samples using this behaviour in the last year, specifically among dangerous threats such as ZeroAccess, Zeus v3 and the rapacious TDL4/TDSS rootkit.

The tactic is not without its drawbacks, mostly to do with the greater complexity required to build malware using a P2P Command & Control (C&C) channel and delays in getting instructions through to bots.

But the pay-off is that it's is harder to disrupt a P2P-based C&C because it uses no fixed hierarchy of servers that can be blocked and broken, precisely the same principle that made the concept popular mong file sharers.

This offers a degree of resilience against the increasing success security researchers have had in disrupting traditional botnets.

"Threat actors have taken note of the broader adoption of P2P, as well as P2P's lack of a centralised control infrastructure, which provides resilience to take down," said Damballa's senior research director, John Jerrim.

"P2P does limit the threat actor's ability to be agile because the distribution of commands to infections is not immediate. We are seeing more threat actors accept this tradeoff in order to gain access to systems that have other defense mechanisms in place."

Another bonus was that P2P could be used by botnet operators as a backup channel to "resurrect" malware disrupted through interception, he said.

"While many enterprises attempt to shut down P2P activity through the use of traditional and application firewalls, today's increasingly mobile workforce is ushering in an increase in P2P-based malware, which has the ability to leak data or conduct other nefarious behavior when devices are outside," argued Jerrim.

The company's motivation for highlighting the P2P malware issue is that its Failsafe "communications profiling" appliance that had been upgrasded to spot compromised computers using the technique to evade controls.

The P2P engineering behind ZeroAccess (infamous for clickfraud but also BitCoin mining) was noticed late last year by another firm, Kindsight, which estimated its network of 'supernodes' - hijacked computers used as privileged controllers - to number as many as 200,000.

The Zeus (or ZeuS or Gameover) bank Trojan, meanwhile, acquired this capability in late 2011. An analysis first made public at the US Black Hat security show by Dell SecureWorks estimated that the technique had been successful enough to recruit nearly 700,000 bots.

Join the CSO newsletter!

Error: Please check your email address.

Tags Personal TechsecurityDamballa

More about DellSecureWorks

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John E Dunn

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts