• About
  • Advertise
  • Careers
  • Contact
Friday, March 31, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Cyber Attacks

French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs

by Cyber360 News
November 11, 2019
in Cyber Attacks
0
French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter
RETADUP Malware botnet

The French law enforcement agency, National Gendarmerie, today announced the successful takedown of one of the largest wide-spread RETADUP botnet malware and how it remotely disinfected more than 850,000 computers worldwide with the help of researchers.

Earlier this year, security researchers at Avast antivirus firm, who were actively monitoring the activities of RETADUP botnet, discovered a design flaw in the malware’s C&C protocol that could have been exploited to remove the malware from victims’ computer without executing any extra code.

However, to do that, the plan required researchers to have control over the malware’s C&C server, which was hosted with a hosting provider located in the Ile-de-France region in north-central France.

Therefore, the researchers contacted the Cybercrime Fighting Center (C3N) of the French National Gendarmerie at the end of March this year, shared their findings, and proposed a secret plan to put an end to the RETADUP virus and protect victims.

According to the proposed plan, the French authorities took control over the RETADUP C&C server in July and replaced it with a prepared disinfection server that abused the design flaw in its protocol and commanded the connected instances of the RETADUP malware on infected computers to self-destruct.

“In the very first second of its activity, several thousand bots connected to it in order to fetch commands from the server. The disinfection server responded to them and disinfected them, abusing the C&C protocol design flaw,” the researchers explain in a blog post published today.

“At the time of publishing this article, the collaboration has neutralized over 850,000 unique infections of RETADUP.”

According to Jean-Dominique Nollet, head of the National Criminal Intelligence Service at Gendarmerie Nationale, the authorities will keep the disinfection server online for a few more months as some infected computers have not yet made a connection with the police controlled C&C server—some have been offline since July while others have network problems.

RETADUP Malware

The French police also contacted the FBI after finding some parts of the RETADUP’s C&C infrastructure in the United States. The FBI then took them down on July 8, leaving the malware authors with no control over the bots.

“Since it was the C&C server’s responsibility to give mining jobs to the bots, none of the bots received any new mining jobs to execute after this takedown,” the researchers say. “This meant that they could no longer drain the computing power of their victims and that the malware authors no longer received any monetary gain from mining.”

Created in 2015 and primarily infected computers throughout Latin America, RETADUP is a multi-functional Windows malware that is capable of mining cryptocurrency using the computing power of infected machines, DDoSing targeted infrastructure utilizing the bandwidth of the victims, and gathering information for espionage.

Web Application Firewall

There are several variants of RETADUP, some of which have been either written in Autoit or using AutoHotkey. The malware has been designed to achieve persistence on Windows computers, install additional malware payloads on infected machines and also periodically perform other attempts to spread itself.

RETADUP Malware

Besides distributing cryptocurrency malware as payload, RETADUP, in some cases, has also been found spreading the Stop ransomware and the Arkei password stealer.

“The C&C server also contained a .NET controller for an AutoIt RAT called HoudRat. Looking at samples of HoudRat, it is clear that HoudRat is just a more feature-rich and less prevalent variant of Retadup,” the researchers learned after analyzing the seized C&C server.

“HoudRat is capable of executing arbitrary commands, logging keystrokes, taking screenshots, stealing passwords, downloading arbitrary files, and more.”

At the time of publishing this article, the authorities have neutralized over 850,000 unique infections of Retadup, with most victims being from Spanish-speaking countries in Latin America.

Cyber360 News

Cyber360 News

Next Post
Slack Resets Passwords For Users Who Hadn’t Changed It Since 2015 Breach

Slack Resets Passwords For Users Who Hadn't Changed It Since 2015 Breach

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In