Microsoft Teams With Symantec for 6th Botnet Takedown
The companies raid data centers in New Jersey and Virginia to shut down Bamital, a clickjacking botnet that has impacted an estimated 8 million users.Federal marshals and representatives of Microsoft and Symantec raided two data centers Feb. 6, shutting down a botnet that the companies estimated attacked at least 8 million computers in the last two years, rerouting search queries and robbing search engine firms of potential revenue. Known as the Bamital botnet, the network of compromised computers hijacked search queries to servers controlled by the bot operators, returning custom—and ofttimes, malicious—search results to earn the controllers affiliate fees. The takedown, dubbed Operation b58, is the sixth for Microsoft, which has targeted bot operators using legal tactics and technical research to disrupt their operations through an initiative known as the Microsoft Active Response for Security (MARS) program. "While the Bamital botnet defrauded the entire online advertising platform, which is what allows the Internet and many online services to be free, what's most concerning is that these cyber-criminals made people go to sites that they never intended to go and took control of the computer away from its owner," Richard D. Boscovich, assistant general counsel for Microsoft's Digital Crimes Unit (DCU), said in a blog post. Users of computers infected with Bamital would be redirected to Websites that paid an affiliate fee to the bot operators. In addition, the eventual destination would sometimes attempt to install malicious software on the victim's computer. Searching for the site of Symantec's Norton Internet Security product, for example, led to a rogue antivirus site that would install malware.
The takedown is the latest in a string of private actions taken by security companies against bot operators. In the last three years, Microsoft and a number of other security companies have taken the fight to criminals by using technical and legal means, as well as cooperating with law enforcement, to attempt to shut down the bad guys' botnets. The networks of compromised computers give cyber-criminals control of their own "cloud" of computers, from which they can mine valuable data, conduct account fraud, send out spam or attack other networks.