Google Disrupts Blockchain-based Glupteba Botnet; Sues Russian Hackers


Google on Tuesday mentioned it took steps to disrupt the operations of a complicated “multi-component” botnet referred to as Glupteba that roughly contaminated multiple million Home windows computer systems throughout the globe and saved its command-and-control server addresses on Bitcoin’s blockchain as a resilience mechanism.

As a part of the efforts, Google’s Risk Evaluation Group (TAG) mentioned it partnered with the CyberCrime Investigation Group over the previous yr to terminate round 63 million Google Docs that had been noticed to have distributed the malware, alongside 1,183 Google Accounts, 908 Cloud Tasks, and 870 Google Adverts accounts that had been related to its distribution.

Google TAG mentioned it labored with web infrastructure suppliers and internet hosting suppliers, comparable to CloudFlare, to dismantle the malware by taking down servers and putting interstitial warning pages in entrance of the malicious domains.

In tandem, the web large additionally introduced a lawsuit in opposition to two Russian people, Dmitry Starovikov and Alexander Filippov, who’re alleged to be chargeable for managing the botnet alongside 15 unnamed defendants, calling the enterprise a “trendy technological and borderless incarnation of organized crime.”

Automatic GitHub Backups

“Glupteba is understood to steal consumer credentials and cookies, mine cryptocurrencies on contaminated hosts, deploy and function proxy parts focusing on Home windows methods and IoT units,” TAG researchers Shane Huntley and Luca Nagy mentioned, with the botnet noticed focusing on victims worldwide, together with the U.S., India, Brazil, and Southeast Asia.

Glupteba was first publicly documented by Slovak web safety firm ESET in 2011. Final yr, cybersecurity agency Sophos printed a report on the dropper, noting it “was in a position to constantly thwart efforts at eradicating it from an contaminated machine,” including “Glupteba additionally takes quite a lot of approaches to put low and keep away from being observed.”


Primarily disseminated by way of sketchy third-party software program and on-line film streaming websites, the modular botnet camouflages as free software program and YouTube movies that, post-installation, might be orchestrated to benefit from its illicit entry to the units to retrieve extra parts and additional a lot of legal schemes, together with —

  • Stealing private account data and promoting the entry to third-parties on a portal referred to as “Dont[.]farm”
  • Merchandising bank cards to facilitate fraudulent purchases from Google Adverts and different Google providers
  • Promoting unauthorized entry to the units to be used as residential proxies through “AWMProxy[.]web” to hide the actions of dangerous actors
  • Serving disruptive pop-up advertisements on the compromised machines, and
  • Hijacking the computing energy of the units to mine cryptocurrency

However in an attention-grabbing twist, moderately than promoting these stolen credentials on to different legal prospects, the Glupteba operators pawned the entry by way of digital machines that had been preloaded with these accounts by logging in utilizing the siphoned usernames and passwords on an internet browser.

“’s prospects pay the Glupteba Enterprise in trade for the flexibility to entry a browser that’s already logged right into a sufferer’s stolen Google account,” the corporate alleged. “As soon as granted entry to the account, the Dont[.]farm buyer has free rein to make use of that account nevertheless they want, together with shopping for ads and launching fraudulent advert campaigns, all with out the true account proprietor’s data or authorization.”

Prevent Data Breaches

The downloaded modules, moreover incorporating measures to maintain it invisible to detection by antivirus options, are designed to execute arbitrary instructions pushed by an attacker-controlled server. Glupteba can also be notable for the truth that in contrast to different conventional botnets, the malware leverages the Bitcoin blockchain as a backup command-and-control (C2) system.

Particularly, as an alternative of relying solely on a listing of predetermined and disposable domains both hard-coded within the malware or obtained utilizing a website technology algorithm (DGA), the malware is programmed to look the general public Bitcoin blockchain for transactions involving three pockets addresses owned by the risk actor in order to fetch the encrypted C2 server tackle.

“Sadly, Glupteba’s use of blockchain expertise as a resiliency mechanism is notable right here and is turning into a extra frequent follow amongst cyber crime organizations,” Google’s Royal Hansen and Halimah DeLaine Prado mentioned. “The decentralized nature of blockchain permits the botnet to get well extra rapidly from disruptions, making them that a lot more durable to shutdown.”

What’s extra, the tech large defined in its lawsuit that the cybercriminal gang maintained a web based presence at “Voltronwork[.]com” to actively recruit builders via job openings on Google Adverts to “assist its web sites, transactions, and total operation.”

The authorized transfer additionally comes a day after Microsoft disclosed it had seized 42 domains utilized by the China-based Nickel hacking group (aka APT15, Bronze Palace, Ke3Chang, Mirage, Playful Dragon, and Vixen Panda) to focus on servers belonging to authorities companies, suppose tanks, and human rights organizations within the U.S. and 28 different nations worldwide.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts