News

Feds To Remove Coreflood Botnet from Some Infected Systems

In the next step in the joint action between the FBI and the Department of Justice to take down the international Coreflood botnet ring, federal authorities will begin contacting some infected users to manually remove the botnet software.

During the initial seizure of the U.S.-based Command and Control servers two weeks ago, the federal government said it redirected traffic intended for these servers to a protected server that sent a signal to terminate the botnet process. This has led to Coreflood operations to drop to close to 10 percent of what it was before the federal raid.

Officials are following up on that action and have obtained an approved order by a U.S. District Judge to allow government officials to contact those in the U.S. with infected systems and remotely remove the Coreflood botnet from their machines after written consent is given by the user. Federal officials will then act against the malware by sending commands that causes the botnet to remove itself, using the same network the perpetrators used to spread and update Coreflood.

According to Paul Ducklin, head of technology in Asia Pacific for the security firm Sophos, this puts the feds in a unique situation: "What made this [initial and recent] court order a first in the U.S. is that it gave law enforcement permission to interfere directly with computers belonging to users who weren't being investigated, or charged with any crime," he wrote in a blog posting.

A serious concern about the method of removal is that the written consent doesn't come with assurance that unforeseen consequences may occur during the process.

"While the 'uninstall' command has been tested by the FBI and appears to work, it is nevertheless possible that the execution of the 'uninstall' command may produce unanticipated consequences, including damage to the infected computers," reads the authorization consent form.

Ducklin also expressed his doubt about this very issue. "What if the crooks have deliberately rewired the 'stop' command to carry out a 'format hard drive' operation instead?"

A safer option for those who still have the dormant botnet on their system could be to use the out-of-band Malicious Software Removal Tool (MSRT) update by Microsoft, released Tuesday.

The update improves the detection process of the specific malware and aids in the safe removal from systems. While updates like these are usually reserved for the first Tuesday of the month, Microsoft will release periodical updates if deemed necessary.

"We can, and will, release MSRT as needed to support takedown activities or other times when the impact will be potentially significant," wrote Jeff Williams, principal group program manager for Microsoft Malware Protection Center, in a blog post.

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • Microsoft Warns IT Pros on Windows Netlogon Fix Coming Next Month

    Microsoft on Thursday issued a reminder to organizations to ensure that their systems are properly patched for a "Critical"-rated Windows Netlogon vulnerability before next month's "update Tuesday" patch distribution arrives.

  • Microsoft Nudging Skype for Business Users to Teams

    Microsoft on Thursday announced some perks and prods for Skype for Business unified communications users, with the aim of moving them to the Microsoft Teams collaboration service instead.

  • How To Improve Windows 10's Sound and Video Quality

    Windows 10 comes with built-in tools that can help users get the most out of their sound and video hardware.

  • Microsoft Offers More 'Solorigate' Advice Using Microsoft 365 Defender Tools

    Microsoft issued yet another article with advice on how to use its Microsoft 365 Defender suite of tools to protect against "Solorigate" advanced persistent threat types of attacks in a Thursday announcement.

comments powered by Disqus