August 23, 2018 By Shane Schick 2 min read

A new campaign involving the Ramnit botnet infected more than 100,000 computers over a two-month period and may foreshadow an even larger cybercriminal attack.

According to Check Point Research, threat actors launched a global series of attacks as part of an operation code-named “Black,” likely beginning in May.

Ramnit has been in operation since 2010 and is well-known as a banking Trojan. Its use in the Black operation includes creating a backdoor on infected machines and extracting information from them. Once installed, the malware offers an entry point for another botnet, Ngioweb, which can operate in both a regular back-connect proxy and relay proxy mode.

More Proxies, More Problems

While Ramnit may be essentially acting as a distribution mechanism for Ngioweb, the end result can be chains of proxy servers. This allows threat actors to make it more difficult for defenders to see what kind of services they’re running because they are hidden behind a bot’s IP address. The larger such a group of botnets becomes, the more readily it could be used for all kinds of nefarious purposes, according to the researchers.

By publishing the victim’s machine in a public channel like the Domain Name System (DNS), for instance, an attacker can then connect to a second infected machine via the relay proxy mode. The first infected machine becomes the relay between the second machine and the host by creating a new connection, and so on. The complexity of this approach not only keeps the attackers’ activities buried from view, but also allows it to quickly grow more powerful.

How to Defend Against Ramnit From the First Stage

Since Ramnit is considered the first-phase malware in the Black operation, security professionals should start there when it comes to prevention. Per IBM X-Force Incident Response and Intelligence Services’ (IRIS)’s cyberattack preparation framework, security teams should determine which users are most active on customer-facing webpages to establish a baseline of normal behavior, making it easier to spot abnormalities earlier on.

Chief information security officers (CISOs) and their teams should also be vigilant of attackers’ attempts to map webpage directories and suspicious user-agent strings to close off any input vulnerabilities. This way, the moment anyone lets Ramnit in, there might still be time to prevent Ngioweb from following close behind.

Source: Check Point Research

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today