Bitdefender has identified two Gameover Zeus variants in the wild: one of them generates 1,000 domains per day and the other generates 10,000 per day. The UK is currently the 6th most infected country with 42 unique IPs to date and that there is growth potential with new control domains continuing to be registered.
Following OpenDNS highlighting that Gameover Zeus had started to use Domain Generation Algorithms (DGAs), Bitdefender spotted that the generated domains were only active for one day each. By “sinkholing” a particular domain, the antivirus company has been able to observe the botnet’s structure and activity for the corresponding day.
“It seems that the recent Gameover Zeus takeover attempt has yielded less-than-perfect results,” states Catalin Cosoi, Chief Security Strategist at Bitdefender. “Further research and international co-operation seem to now be needed to stamp out this menace once and for all.”
After sinkholing five domains on five different days for each of the two botnets, Bitdefender has drawn several conclusions, notably that the botnets corresponding to those two DGAs are very different when it comes to countries of interest.
The first version has a bigger infection density in the US, which is to be expected as most of the malware families extort money from there. 83.7% of the 5,907 unique IPs that contacted Bitdefender’s sinkhole were received from the US. However, the second version is, without question, targeting Ukraine and Belarus, with 70.7% of 4,316 unique IPS emerging from these countries.
Although there have been multiple domains registered for the botnet targeting US lately, Bitdefender has found none for the botnet targeting Ukraine and Belarus, meaning that no-one is using the bots at this moment. However, the bot-net could find itself with a new master at any point in the future.