Array
(
)
Computerworld India News | Flashback Botnet on Macs was a Flop: Symantec | Computerworld.in

Flashback Botnet on Macs was a Flop: Symantec

Gregg Keizer May 18, 2012
Malware infected 600,000 Macs, but hackers haven't collected a dime.

The hackers in charge of the Flashback botnet managed to generate $14,000 from their click fraud campaign, but have not been paid, Symantec has said.

New analysis of the Flashback botnet and the traffic between infected Macs and command-and-control (C&C) servers exposed the earnings and the lack of payment, Liam O Murchu, manager of operations at Symantec's security response center, said in an interview.

O Murchu credited security companies' efforts for preventing the botnet's handlers from generating more money through click fraud.

"Lots of security companies sinkholed Flashback's domains, and this caused [the hackers] a lot of problems," said O Murchu.

Starting in early April, antivirus vendors, including Symantec, snatched potential C&C domains before the attackers did, effectively blocking orders from reaching many of the estimated 600,000 infected Macs. The commands fall down a metaphoric "sinkhole" instead.

Part of the Flashback botnet survived those efforts, however. The hackers retained control of at least 10,000 Macs, which they infected with additional code that steals clicks from ads that Google's search engine displays alongside search results.

Altogether, Flashback's creators were able to use less than 2% of the botnet to crank out ghost clicks.

Even though the percentage seems small, those Macs displayed more than 10 million ads in a three-week span; 400,000 of those ads were clicked by users. The 400,000 clicks were worth approximately $14,000.

The profit-making strategy, called "click fraud," redirects large numbers of people to online ads not normally served by the site the user is viewing. The criminals receive kickbacks from the sometimes-legitimate, sometimes-shady intermediaries for each ad clicked.

In this case, said O Murchu, it seems the Flashback gang didn't actually earn a dime.

"The traffic we've analyzed tells us that they hadn't been paid," said O Murchu, referring to the hackers' efforts to get their money. "They haven't been able to provide the information to the pay-per-click [PPC] affiliate that [was] required to be paid."

O Murchu declined to identify the PPC affiliate that served 98% of the Flashback-generated clicks, but said it appeared the PPC was legitimate and not one of the shadier such firms that essentially pawn off bogus clicks as the real deal.

LATEST NEWS

Google App Maker aims to ease enterprise development

Google is making it simpler for business to create custom apps. Its new App Maker service lets you integrate apps with Google's services and run them on the same data center infrastructure as its G Suite of productivity software.