New report finds that multifunctional malware – not designed for specific purposes but flexible enough to perform almost any task – is becoming more widespread
Woburn, MA – August 30, 2018 – Today, Kaspersky Lab researchers have published a report on botnet activity from January through June of 2018, which has found that multifunctional malware – not designed for specific purposes but flexible enough to perform almost any task – is becoming more widespread. The report is the result of an analysis of more than 150 malware families and their modifications circulating through 60,000 botnets around the world.
Using Kaspersky Lab’s Botnet Tracking technology, the company’s researchers continuously monitor botnet activity to prevent potential cyberattacks or to uncover and protect from a new type of banker Trojan. The technology works by emulating a compromised device, trapping the commands received from threat actors that are using the botnets to distribute malware, which provides the research team with valuable malware samples and statistics.
The most distinctive growth in the first half of 2018 was demonstrated by malware of a versatile nature, in particular, Remote Access Tools (RAT) malware that provides almost unlimited opportunities for exploiting the infected PC. Since the beginning of 2017, the share of RAT files found among the malware distributed by botnets almost doubled – rising from 6.55 percent to 12.22 percent. Njrat, DarkComet, and Nanocore topped the list of the most widespread RATs. Due to their relatively simple structure, the three backdoors can be modified by experienced or inexperienced threat actors. This allows the malware to be adapted for distribution in a specific region.
The only type of single-purpose malicious programs to demonstrate impressive growth within botnet networks were miners. Even though their percent of registered files is not comparable to highly popular multifunctional malware, their share increased two-fold and this fits in the general trend of a malicious mining boom as seen earlier by our experts.
In addition, according to the analysis, Trojans did not demonstrate as much growth as RATs but, their share of detected files still increased from 32.89 percent in the second half of 2017 to 34.25 percent in the first half of 2018. Similar to the backdoors, one Trojan family can be modified and controlled by multiple command and control (C&C) servers, each with different purposes, for example, cyberespionage or the stealing of credentials.
In regard to declines, the share of single-purpose malware distributed through botnets dropped significantly in comparison to the second half of 2017. For example, in the second half 2017, 22.46 percent of all unique malicious files distributed through the botnets monitored by Kaspersky Lab were banking Trojans, while in the first half of 2018, the share of bankers dropped by 9.21 percentage points to 13.25 percent of all malicious files.
The share of spamming bots, another type of single-purpose malicious software distributed through botnets, also decreased significantly from 18.93 percent in the second half of 2017 to 12.23 percent in the first half of 2018. DDoS bots, yet another typical single-purpose malware, also dropped, from 2.66 percent in the second half of 2017 to 1.99 percent in first half of 2018.
“The reason why RATs and other multipurpose malware are taking the lead when it comes to botnets is obvious: botnet ownership costs a significant amount of money and in order to make a profit, criminals should be able to use each and every opportunity to get money out of malware,” said Alexander Eremin, security expert at Kaspersky Lab. “A botnet built out of multipurpose malware can change its functions relatively quickly and shift from sending spam to DDoS or to the distribution of banking Trojans. While this ability in itself allows the botnet owner to switch between different ‘active’ malicious business models, it also opens an opportunity for a passive income: the owner can simply rent out their botnet to other cybercriminals.”
To reduce the risk of turning your devices into part of a botnet, users are advised to:
- Patch the software on PCs as soon as security updates for the latest bugs uncovered are available. Unpatched devices can be exploited by cybercriminals and connected into a botnet.
- Avoid downloading pirated software and other illegal content. These can be used to distribute malicious bots.
- Use antivirus software to protect PC’s from being infected with any type of malware – including malware used for the creation of botnets.
Read the full version of the report on Securelist.com.
About Kaspersky Lab
Kaspersky Lab is a global cybersecurity company, which has been operating in the market for over 20 years. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.
Kaspersky Lab Media Contact:
Denise Berard
781.503.1836
Denise.Berard@kaspersky.com