Avalanche: Thwarting Cybercriminal Hazards with Law Enforcement Collaboration

On November 30th, an international law enforcement operation stamped out Avalanche, a large-scale content and management platform designed for the delivery of bullet-proof botnets. Avalanche’s scale and scope spanned victims from 180 countries, over 800,000 domains in 60+ top-level domains (TLD), more than one million phishing and spam e-mails, 500,000 infected machines worldwide, and 130TB of captured and analyzed data.

The coordinated effort from international law enforcement agencies that include Germany’s Public Prosecutor’s Office Verden and the Lüneburg Police, the U.S.’s Attorney Office for the Western District of Pennsylvania, Department of Justice and the Federal Bureau of Investigation (FBI), Europol, and Eurojust as well as partners in ShadowServer, resulted in one of the most successful anti-cybercrime operations in recent years. Avalanche, whose takedown was four years in the making, joins SpyEye, SIMDA, Refud.me and Cryptex Reborn, DRIDEX, ZeroAccess, TDSS, ZeuS/ZBOT, Dorkbot and Nigerian scammers, in a string of similar takedowns that thwarted malefactors from further launching cyberattacks and stealing financial data.

We also commend the security researchers and analysts who were instrumental in dismantling Avalanche, along with the support of industry stakeholders and all those who helped in this long investigation.

Malware Family Trend Micro Detection Malware Family Trend Micro
Detection
Citadel CITADEL/ZBOT Rovnix ROVNIX
Corebot COREBOT Smoke Loader / Dofoil GAMARUE
Bolek BOLEK TeslaCrypt RANSOM_TESLACRYPT / CRYPTESLA
Gozi2 GOZI/PAPRAS Tiny Banker / Tinba TINBA
Goznym NYMAIM/KRYPTIK UrlZone BEBLOH
KINS/VMZeus ZBOT  Vawtrak VAWTRAK
Matsnu BKDR_MATSNU  Xswkit BEBLOH/TALALPEK
Nymaim NYMAIM / HPNYMAIM  Cerber RANSOM_CERBER
Pandabanker KRYPTIK/INJECT  Locky RANSOM_LOCKY
Randybus BANKER

Figure 1. Some of the malware families leveraged by Avalanche

 

Information from Europol and Shadowserver Foundation cited over 20 malware families involved in Avalanche’s campaigns, which Trend Micro’s free HouseCall online scanner has detections for. Affected end users can also utilize HouseCall to remove the related files from their systems—which is as crucial as malware removal. Command and control (C&C) communications from infected machines, for instance, can still be triggered, consequently generating junk traffic that can affect system performance. A compromised machine could also be potentially configured to prevent it from accessing Internet resources such as cleanup tools and patches. Users can mitigate risks of reinfection by updating device and account credentials, checking if online accounts or backups have been modified, and ensuring that the latest patches are installed in the system.

Figure 2. Top countries affected by banking malware, Q1–Q3 2016

 

Cashing In on Financial Information

Aside from ransomware, Avalanche’s arsenal mainly comprised banking malware. These enabled bad guys to surreptitiously harvest e-mail and banking credentials, which cost German online banking systems approximately 6 million euros in losses.

Avalanche paints a classic picture of cybercrime’s commercialization, employing malware to cash in on the victims’ digital information. Feedback from our Smart Protection Network showed that within the first three quarters of 2016, Brazil and the U.S. had the most banking malware detections in their regions. In Europe, most of detections were observed in Germany, Italy, France, United Kingdom, Austria, and Spain. In the APAC region, Japan, the Philippines, Vietnam and China took the brunt of threats that leveraged banking Trojans.

 

Making the World Safe for Exchanging Digital Information

Avalanche’s infrastructure was spread across 30 countries and several U.S. states, and needed a multinational effort to take down. Trend Micro, particularly the Forward Looking Threat Research (FTR) team, works concertedly with various law enforcement agencies around the world—the Interpol, Europol, FBI, and U.K.’s National Crime Agency, to name a few—to help fight cybercrime.

We help empower international law enforcement organizations that keep watch over their cyberspace by providing the necessary technology, information and expertise. We don’t just supply data; Trend Micro also actively collaborates with law enforcement on investigations to ultimately attribute and bring to justice those behind cybercriminal attacks.

More than just working to protect our customers, Trend Micro also aims to make the world safe for exchanging digital information. Cybercrime is a growing global “enterprise,” but with five arrests, 37 searched premises, 39 seized servers and 221 more knocked offline, Avalanche’s takedown, along with similar triumphs, not only serves as a cautionary tale for would-be cybercriminals. It also demonstrates our industry’s progress in making the internet safer for everyone.

Post from: Trendlabs Security Intelligence Blog – by Trend Micro

Avalanche: Thwarting Cybercriminal Hazards with Law Enforcement Collaboration

Read more: Avalanche: Thwarting Cybercriminal Hazards with Law Enforcement Collaboration

Story added 7. December 2016, content source with full text you can find at link above.