The number of P-to-P malware samples surged during the past year, researchers from Damballa said The number of malware samples that use P-to-P (peer-to-peer) communications has increased fivefold during the past 12 months, according to researchers from security firm Damballa.The largest contributors to this increase are advanced threats like ZeroAccess, Zeus version 3 and TDL4, said Stephen Newman, vice president of products at Damballa. However, there are also other malware families that adopted P-to-P as a command-and-control (C&C) channel recently, he said.“The use of P-to-P in advanced malware threats has been around for quite some time, but we’ve never really seen it take the hold that we’ve started to see now,” Newman said. The reason why this is happening now has to do with cybercriminals’ desire for resiliency in the face of takedown efforts that can disrupt centralized C&C infrastructures, he said.Botnet masters stand to lose access to thousands or millions of infected computers if their control servers are shut down, so they’re looking into decentralized P-to-P communications, where botnet clients can relay commands to one another, as a resilience technique along with other methods like the use of domain name generation algorithms (DGAs), he said. Another benefit for attackers is that malicious P-to-P traffic is hard to detect and block at the network level by using traditional approaches that rely on lists of known IP addresses and hosts associated with C&C servers.TDL4 is probably the most prevalent malware family that uses P-to-P communications, said John Jerrim, senior research scientist at Damballa. However, TDL4’s P-to-P communication channel is only used as backup in case no C&C server can be reached by using a domain generation algorithm, he said. TDL4 is best known for being highly persistent and hard to remove from computers because it infects the Master Boot Record (MBR), a special section of the hard drive that contains code executed during the boot process before the operating system starts. The threat is primarily used to distribute other malware as part of pay-per-install schemes and cybercriminal affiliate programs.Zeus version 3, which is also known as GameOver, is a Trojan program that steals online banking credentials and other financial data. Unlike TDL4, Zeus v3 uses P-to-P as its primary C&C channel and falls back to using a DGA when the malware cannot reach any peer from the P-to-P network.ZeroAccess is a particularly interesting threat because it only uses P-to-P communication for command-and-control purposes. The threat is distributed with the help of Web exploit toolkits like Blackhole, Neosploit and Sweet Orange, and is primarily used for click fraud and Bitcoin mining.Damballa released a report about the use of P-to-P communications in ZeroAccess, Zeus v3 and TDL4 on Tuesday. The company also added the capability to detect this type of malicious traffic to its Failsafe network security appliance for enterprises.Researchers from the Institute for Internet Security in Germany, VU University in Amsterdam and security providers Dell SecureWorks and Crowdstrike recently published a report on the resilience of peer-to-peer botnets.“Our evaluation has shown weaknesses which could be used to disrupt the Kelihos and ZeroAccess botnets,” they said in their report. “However, we have also shown that the Zeus and Sality botnets are highly resilient to sinkholing attacks, the currently most used class of disruptive attacks against P2P botnets.” The researchers concluded that finding alternative mitigation methods against P-to-P botnets is “urgently needed.” Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe