October 25, 2016 By Larry Loeb < 1 min read

The Sphinx Trojan is based on the source code of the infamous Zeus banking Trojan. First seen around August 2015, Sphinx has been upgraded with a new method of randomizing the domain names it uses for the command-and-control (C&C) servers to which it links.

Besides the primary domains of the C&C servers hardcoded into the Trojan, this kind of approach is designed to implement a backup method should authorities take down the primary servers.

A Simplistic Algorithm

This Domain Generation Algorithm (DGA) enables the attacker to establish non-hardcoded C&C servers and obtain domain names that only he or she knows beforehand. The malware author can then register these names for nefarious use. Many pieces of malware use DGAs to generate C&C host names. That goes for both primary and backup servers.

Arbor Networks classified this DGA as time-dependent, deterministic and arithmetic-based (TDD-A). It uses the current date as the initial seed, creates random strings of 16 characters and appends .com at the end.

The DGA generates 128 domains per day, according to Softpedia. But researchers had no problem cracking this simplistic algorithm. They even revealed the code used to figure out the domains.

Sphinx Trojan Gets Cracked

Once the researchers figured out the technique, they set up sinkholes for the Trojan. The sinkholes found only 1,230 active bots, far fewer than the millions they had assumed were out in the wild.

According to Arbor Networks, most of the bots were located in Brazil That makes sense, since an IBM X-Force report in August found that Sphinx had been used in a Brazilian bank campaign.

Now that the DGA has been cracked, authorities should be able to set up a way to track the Trojan and stop its criminal activity.

More from

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Research finds 56% increase in active ransomware groups

4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now accounting for only 17% of all cybersecurity incidents compared to 21% in 2021. Unfortunately, it’s too early to know if this trendline will continue. A recent report released by Searchlight Cyber shows that there has been a 56% increase in…

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today