Fortinet Threat Landscape Research Finds Surprising Comeback in Lethic Spam Botnet
January 10, 2012 09:00 ET
Fortinet Threat Landscape Research Finds Surprising Comeback in Lethic Spam Botnet
Report Also Discloses New Android Malware Hitting Phone Bills to the Tune of EUR 18.00
SUNNYVALE, CA--(Marketwire - Jan 10, 2012) - [ Fortinet® ] (
Lethic was initially discovered in 2008 and was primarily used to distribute pharmaceutical spam. At one point, the botnet was alleged to be responsible for 8 to 10% of the spam generated worldwide. In early 2010, the botnet was severely disabled when Neustar employees contacted a number of Internet Service Providers in an attempt to disable the botnet's command and control servers. While that cooperative effort succeeded in significantly reducing the botnet's spam output, the owners managed to secure control of the botnet again by February. And by April, it had sputtered back to life and was again sending roughly two billion spam emails a day, about 1.5% share of the overall spam market.
"Lethic is a botnet that uses encryption when infected computers communicate to the command and control. In addition, Lethic uses its infected hosts (bots) as proxies, tasking them with reconnaissance missions to discover new spam routes," said Derek Manky, senior security strategist at Fortinet. "The dynamic approach used by this botnet has allowed it to survive over the years, despite takedown attempts. There are many different ways a botnet can be designed, and for total takedown, there must be a clear understanding of the anatomy of the botnet in question. Even after a seemingly successful takedown such as Lethic, new variants often crop up allowing the botnet to grow again from a new seed."
Foncy Android Malware Debuts in France
A new Android Trojan named Foncy, which was recently uncovered by Kaspersky's Denis Maslennikov and subsequently dissected by Fortinet's European-based labs, was developed and is currently spreading in France. This particular Trojan is a dialer, meaning it sends SMS messages to short numbers without a user's consent.
"Unsuspecting end-users have installed the malicious application on their mobile device, believing it to be the legitimate plan tracking application SuiConFo (SUIvi CONsommation FOrfait, French for 'Track Your Plan')," said Axelle Apvrille, senior mobile anti-virus researcher at Fortinet. "When a user installs the malware on their device, a SuiConFo icon appears in the device's launch menu. When the icon is pressed, the application displays an error message that reads: 'ERROR: Android version is not compatible,' while in the background, the Trojan surreptitiously sends four SMS messages to a list of short numbers. Those numbers can end up costing the user up to EUR 18.00."
If a user thinks they might be infected, [ FortiGuard Labs ] suggests they immediately check their bill, report any anomaly they find and uninstall the suspicious application. A legitimate version of the SuiConFo application can be downloaded from a developer named Alou, on the Android market.
About FortiGuard Labs
[ FortiGuard Labs ] compiled threat statistics and trends for this threat period based on data collected from [ FortiGate® ] network security appliances and intelligence systems in production worldwide. Customers who use Fortinet's FortiGuard Services should be protected against this vulnerability with the appropriate configuration parameters in place.
FortiGuard Services offer broad security solutions including antivirus, intrusion prevention, Web content filtering and anti-spam capabilities. These services help protect against threats on both application and network layers. FortiGuard Services are updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multi-layered security intelligence and zero-day protection from new and emerging threats. For customers with a subscription to FortiGuard, these updates are delivered to all FortiGate, FortiMail™ and FortiClient™ products.
All Fortinet Threat reports can be found [ here ]. December's Security Minute video podcast, which features commentary on today's latest threats can be found [ here ]. Ongoing research can be found in the [ FortiGuardCenter ] or via [ FortiGuard Labs ]' [ RSS feed ]. Additional discussion on security technologies and threat analysis can be found at the [ Fortinet Security Blog ].
About Fortinet ([ www.fortinet.com ])
Fortinet (
Copyright © 2011 Fortinet, Inc. All rights reserved. The symbols ® and ™ denote respectively federally registered trademarks and unregistered trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiManager, FortiMail, FortiClient, FortiCare, FortiAnalyzer, FortiReporter, FortiOS, FortiASIC, FortiWiFi, FortiSwitch, FortiVoIP, FortiBIOS, FortiLog, FortiResponse, FortiCarrier, FortiScan, FortiDB and FortiWeb. Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties and Fortinet does not independently endorse such statements. Nothing in the news release constitutes a warranty, guaranty, or contractually binding commitment. This news release may contain forward-looking statements that involve uncertainties and assumptions. If the uncertainties materialize or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including but not limited to, any statements related to expected trends in cybercriminal activity. These trends are difficult to predict and any stated expectations regarding these trends may not ultimately be correct. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements.
FTNT-O