April 16, 2015 By Douglas Bonderud 2 min read

Most malware aims for low-hanging fruit, opting for known vulnerabilities and poorly written code. This not so with the AAEH botnet — also known as Beebone or Changeup — which uses a polymorphic downloader to infect systems and change form every few hours, according to a recent warning from the U.S. Computer Emergency Readiness Team. However, a united effort by Europol’s European Cybercrime Centre, the Joint Cybercrime Action Taskforce, Dutch law enforcement, the FBI and several private security firms has now stung back at Beebone and disrupted its operations. However, risks still persist.

Beebone’s Prerogative

Beebone works to change its shape, then propagates across everything from networks to removable drives and ZIP and RAR archive files. The malware changes form with each infection, and law enforcement agencies have already collected millions of unique samples. This downloader is often used as a gateway for other malware families such as Zeus, CryptoLocker, ZeroAccess and Cutwail. Once infected, users may lose credentials for online services, have their banking information compromised or have key files encrypted pending a ransom payment. Additionally, AAEH can inhibit the function of antivirus tools by blocking access to security company websites and IP addresses. In effect, Beebone stings and then paralyzes users, leaving them cut off from any help and unable to find the bug responsible for their injury.

Clipping Wings

As reported by ZDNet, a joint law enforcement effort has now succeeded in disrupting Beebone. Doing so meant analyzing more than 5 million samples of the botnet worm, officially known as W32/Worm-AAEH. Data collected indicates at least 12,000 computers were compromised in 195 countries, including the United States, Japan, Taiwan and India. Europol calls the botnet “very sophisticated” because it allows “multiple forms of malware to compromise the security of victims’ computers” and updates itself nearly 20 times per day.

Disrupting Beebone required the joint tax task force to register, suspend and seize a host of domain names linked to the botnet. This “sinkholing” broke the links between infected computers and the botnet’s command-and-control center, allowing the infections to be removed. However, doing so still requires an in-depth virus scan to ensure networks and systems are completely clean.

It’s tempting to think of Beebone as a relatively minor threat, especially when compared with recent retail breaches that saw malware snatching millions of consumer records or stealing money directly from bank ATMs. However, AAEH and similar code represents the future of malware, with sophisticated programs able to change shape on demand, sting users and then flit off to their next victim. Defending against this type of malware is an emerging challenge; it took the full attention of four government agencies and two security firms just to identify and disrupt this threat.

The bottom line is that malware is evolving on two parallel tracks: simple, smash-and-grab tools that target obvious vulnerabilities and complex, polymorphic tools that can avoid detection and infect systems across multiple vectors. Getting swarmed by small-scale operators is more likely than being stung by the big guys, but it never hurts to carry the IT security equivalent of an EpiPen: up-to-date software, strong passwords and solid antivirus software backed by random testing. It’s better to feel the pain and salve the wound than blunder into the beehive.

More from

CISA adds Microsoft SharePoint vulnerability to the KEV Catalog

3 min read - In late October, the United States Cybersecurity & Infrastructure Security Agency (CISA) added a new threat to its Known Exploited Vulnerability (KEV) Catalog. Cyber criminals used remote code execution vulnerability in Microsoft SharePoint to gain access to organizations’ networks. The CISA press release states that “these types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”However, Microsoft identified and released a patch for this vulnerability in July 2024. Cybersecurity experts are…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today