WireX DDoS botnet takedown shows the best side of the security industry

Posted by   Martijn Grooten on   Aug 29, 2017

It is easy to be cynical about the security industry and its tendency to make ever bigger mountains out of molehills, but behind a thin layer of marketing, there are a great many people who really care about making the world a more secure place.

We have seen many examples of researchers from competitor companies working together in botnet takedowns, law enforcement actions against malicious actors, and the writing of more secure standards. The latest example of such a collaboration is the combined effort that led to the takedown of the WireX Android DDoS botnet.

wirex_unique_ips.png

The number of unique IP addresses active in the WireX botnet every hour.

 

As DDoS botnets go, WireX wasn't particularly powerful, though still powerful enough to make many a website unavailable, thus making the associated ransom notes rather credible. It also wasn't particularly hard to detect, since it used random 26-character strings for the User-Agent header. Of course, this is something that could easily have been changed.

What made WireX rather unique though, was that it ran on Android devices and was made up of some 300 apps available on Google's official Play Store. These apps have since been removed both from the Play Store and from all infected devices.

The takedown effort was a combined effort from several companies, four of which — Akamai, Cloudflare, Flashpoint and RiskIQ — published the very same post-mortem blog post earlier this week. This is really the security industry at its best.

Virus Bulletin is always happy to help facilitate industry-wide collaboration, for example during the upcoming VB2017 conference. Don't hesitate to contact me (martijn.grooten@virusbulletin.com) if you think we can be of help! And don't forget to register for the conference for a chance to meet with other researchers and build the connections that are essential for a more secure world!

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

New paper: LokiBot: dissecting the C&C panel deployments

First advertised as an information stealer and keylogger when it appeared in underground forums in 2015, LokiBot has added various capabilities over the years and has affected many users worldwide. In a new paper researcher Aditya Sood analyses the…

VB2019 presentation: Building secure sharing systems that treat humans as features not bugs

In a presentation at VB2019 in London, Virtru's Andrea Limbago described how, by exploring data sharing challenges through a socio-technical lens, it is possible to make significant gains toward the secure sharing systems and processes that are vital…

VB2019 presentation: Attor: spy platform with curious GSM fingerprinting

Attor is a newly discovered cyber-espionage platform, use of which dates back to at least 2014 and which focuses on diplomatic missions and governmental institutions. Details of Attor were presented at VB2019 in London by ESET researcher Zuzana…

Why we encourage newcomers and seasoned presenters alike to submit a paper for VB2020

With the call for papers for VB2020 currently open, we explain why, whether you've never presented before or you're a conference circuit veteran, if you have some interesting research to share with the community we want to hear from you!

VB2019 paper: The cake is a lie! Uncovering the secret world of malware-like cheats in video games

At VB2019 in London, Kaspersky researcher Santiago Pontiroli presented a paper on the growing illegal economy around video game cheats and its parallels with the malware industry. Today we publish both Santiago's paper and the recording of his…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.