Google disrupts major malware distribution network Glupteba

Credit: Dreamstime

Working with several internet infrastructure and hosting providers, including Cloudflare, Google disrupted the operation of an aggressive Windows botnet known as Glupteba that was being distributed through fake ads. It also served itself as a distribution network for additional malware. 

In addition, the company filed a lawsuit against two individuals believed to be based in Russia and who play a central role in operating the botnet.

Google’s action targeted key command-and-control infrastructure such as servers and domain names used by Glupteba, as well as many rogue accounts on Google’s services that were being used to distribute it. 

While this is a severe blow to the botnet, whose estimated size is over two million computers, it’s unlikely to be its demise because Glupteba has a backup command-and-control (C&C) mechanism that relies on the Bitcoin blockchain. This provides it with resilience against takedown attempts.

“We’ve terminated around 63 million Google docs observed to have distributed Glupteba, 1,183 Google accounts, 908 cloud projects, and 870 Google ads accounts associated with their distribution,” researchers with Google’s Threat Analysis Group said in a report. “Furthermore, 3.5 million users were warned before downloading a malicious file through Google Safe Browsing warnings.”

What is Glupteba?

Glupteba is a Windows malware program with a root-kit component that provides advanced stealth and self-defence capabilities and a variety of additional components or plug-ins that extend its functionality. 

These include cryptocurrency mining, stealing passwords and cookies from browsers, spreading over the local network, compromising local MikroTik routers and using them as proxies for malicious traffic, and performing DNS cache poisoning to direct local network users to rogue websites.

Glupteba’s feature set allows it to act as a downloader for other malware and there is evidence it has been used to distribute malware for other threat actors. One such example is the Meris DDoS botnet, which is known to abuse MikroTik routers.

The Glupteba dropper, the main component of the malware, is distributed in several ways, but primarily through fake web pages and messages on social media sites that promote pirated versions of popular commercial applications and games. 

Malicious ads distributed through advertising networks that link to the malware have also been observed, promoting fake crypto trading apps and other services. The attackers used Google Accounts to post spam comments on YouTube and host docs with links to the malware in Google Docs.

To spread to other systems on the local network, Glupteba uses a plugin that exploits the EternalBlue SMB vulnerability. All communication with the command-and-control servers is achieved through another component that acts as a local proxy.

Upon installation, the dropper uses system scheduled tasks and system tools like certutil to execute itself and establish persistence. It also adds exceptions to Windows Defender for the malware folders, continuously kills the Windows Update process, and deploys two system drivers whose goal is to hide the malware process.



Menu