Tracking infrastructure of malnets gives the security industry 'the big picture,' says company researcher In the war on malware, it is important not only to recognize the malicious software, but also where it is coming from.Blue Coat, a web security firm, said that tracking “malnets” through geolocation of their infrastructure nodes is helping it respond more quickly and effectively to attacks that number in the millions every day.On its website the company provides a graph of the number of daily threats over the previous week. The number of blocked threats reported for Aug. 26 — a bit lower than the previous six days — was 17,765,686.Malnets are just what the name implies, malicious networks or distributed infrastructures within the Internet, built and maintained for the purpose of launching persistent, extended attacks. “They deploy the stuff you can buy in these underground [malware] markets,” said Tim van der Horst, a senior malware researcher at Blue Coat.The malnets snare users, typically when they are visiting trusted sites, and route them to malware, via relay, exploit and payload servers that continually shift to new domains and locations. Blue Coat is currently tracking more than 500 unique malnets, van der Horst said, although not all of them are active every day, and the field is dominated by a few giants: Cavka, Glomyn, Cinbric, Naargo and the largest of all, Shankule, which van der Horst said, “has its fingers in every kind of [criminal] pie you can imagine, all over the world.”[See also: Advanced persistent threats can be beaten, says expert]Tracking malnets does not make it possible to take them down and arrest those who run them. While some of them may have servers in the U.S., their command and control centers tend to be in Russia, China and Eastern European countries where it would be difficult to find them even with government cooperation.Blue Coat said that nearly every advanced persistent threat (APT) is coming from China, Russia is dominant in pharma scams and more than 90% of porn-related malnets come from Germany.But van der Horst said tracking the infrastructure of malnets gives those in the security industry “the big picture,” and therefore improves identification and defense capability.“If we see something bad in WebPulse [a Blue Coat web security software product], we start back-tracking from there,” van der Horst said. “We know it had to follow some kind of path. We see a lot of stuff on the Net, so we ask if this looks like anything else. We do horizontal mapping to find out if they were they relayed to a particular server.” “We extract the server DNA,” he said, so “even though they change their IP address and domain name, we can still recognize it.”“You care less and less about payload,” van der Horst said. “It could be something five years old or a brand-new, zero-day exploit. But you know that everything coming from that server network is bad.”There are two ways to thwart cyber criminals, he said. “You can go after legally,” but Blue Coat doesn’t have good presence with that. “We focus on detecting their [malnet] infrastructure in real time and letting clients know.”“All our known threats go into a database. We have updates every five minutes, and four times a day we do a bigger update,” he said. Even with that, the threats keep getting more frequent and more diverse, van der Horst said. “The bad guys are really diversifying in location and activities. And organized crime has big presence in this space. All of the things they have done for years, all of that applies in cyberspace.” Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe