January 10, 2017 By Larry Loeb 2 min read

Security firm Cyren issued a new report, “Botnets: The Clone Army of Cybercrime,” that described a new method of circumventing security blocking efforts. The researchers referred to this evasive technique as a “ghost host.”

Ghost Host in the Machine

SecurityWeek noted that, to carry out the procedure, malware authors place unknown host names in the HTTP host fields of a botnet’s communications. These host names can be registered and unregistered. Because of the indeterminate state of the included host names, which may or may not resolve in the Domain Name System (DNS), this can easily fool usual web security and URL-filtering systems.

The total IP range associated with a bad URL is not usually blocked because legitimate domains may also exist at the IP. Blocking the entire IP would block those legitimate domains.

The impetus for this discovery originated when Cyren detected communications between bot and server even after it blocked the malware server’s URL in the filters protecting a system. It noticed that a botnet member informed the command-and-control (C&C) server that a new infection had occurred. The researchers said they were unsure just how this communication took place at all.

Playing the Name Game

While the destination IP address of the communication packet was still known to be a bad server, the HTTP host fields that were used for requests were assigned to completely different domains. These domains are stuffed into the host fields that Cyren referred to as ghost hosts.

In one case, the researchers noted, the fake domains were “events.nzlvin.net” and “json.nzlvin.net.” The resolved domains were blocked, but not the ghost hosts. Changing the ghost host name sent in a communication might prompt different response actions from the C&C server. One host might document a new addition to the botnet, but another ghost name could serve new exploit code.

This is a novel technique that establishes a side-channel communication with a malware’s C&C server, survives a primary blacklist and delivers a resiliency that could impact the overall malware landscape. The increase in resiliency that it brings to malware will have to be evaluated in the near future.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today