The new Malware Hunter service could help companies and security vendors quickly block traffic to malware servers. Credit: JD Hancock There’s now a new tool that could allow companies to quickly block communications between malware programs and their frequently changing command-and-control servers.Threat intelligence company Recorded Future has partnered with Shodan, a search engine for internet-connected devices and services, to create a new online crawler called Malware Hunter.The new service continuously scans the internet to find control panels for over ten different remote access Trojan (RAT) programs, including Gh0st RAT, DarkComet, njRAT, ZeroAccess and XtremeRAT. These are commercial malware tools sold on underground forums and are used by cybercriminals to take complete control of compromised computers.To identify command-and-control (C&C) servers, the Malware Hunter crawler connects to public Internet Protocol addresses and sends traffic that replicates what these Trojan programs would send to their control panels. If the receiving computers send back specific responses they’re flagged as C&C servers. Malware Hunter has identified over 5,700 RAT servers so far, with more than 4,000 of them located in the U.S. The largest number of control panels found was for Gh0st RAT, a malware program of Chinese origin that has been used in targeted cyberespionage attacks since 2009.The C&C list generated by Malware Hunter is updated in real time, so security vendors, companies and even independent researchers can use it in firewalls and other security products to block malicious traffic. Blocking traffic to these C&C servers at the network level could prevent attackers from abusing infected computers or stealing data. This could be quicker than waiting for security companies to discover new RAT samples, extract the command-and-control servers from their configuration and adding a blocking rule for them.The traffic signatures used to identify RAT C&C servers is based on research by Recorded Future, which used the same technique to identify malicious servers in the past, but on a smaller scale.The downside of crawlers masquerading as infected computers when scanning the entire internet is that it could trigger false positive alerts on people’s security systems that filter incoming traffic.“Malware Hunter doesn’t perform any attacks and the requests it sends don’t contain any malicious content,” the service’s creators said on its website. “The reason your security product raised an alert is because it is using a signature that should only be used for traffic leaving the network (egress) but is incorrectly being applied to incoming traffic (ingress).” Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe