Thursday, April 10, 2025
HomeBotnetNecurs, the world's largest spam botnet with nearly 5 million infected bots...

Necurs, the world’s largest spam botnet with nearly 5 million infected bots launching DDoS attacks

Published on

SIEM as a Service

Follow Us on Google News

Necurs is a malware that is mainly known for sending large spams contains nearly 5 million infected bots, of which one million active each day.

Its not only Spam bot, but peace of malware that is composed of a main bot module Necurs usefulness is separated over a few modules that are stacked on tainted PCs continuously, just when required.

According to security researchers from threat intelligence company Anubis Networks, As indicated by the typical port 80 interchanges, a Necurs tainted framework was speaking with an arrangement of IPs on an alternate port utilizing, what had all the earmarks of being, an alternate convention.

- Advertisement - Google News

The DDoS capability was added almost six months ago via Necurs’ new Proxy module.

The accompanying picture demonstrates a case of this system activity.

An underlying investigation of the module arranged it as an on-request intermediary server that could malicious traffic through infected hosts, by means of HTTP, SOCKSv4, and SOCKSv5 intermediary conventions.

Every DDoS record will easily breakable by A Necurs DDoS attack

In the event that Necurs could ever choose to utilize its bots for a DDoS assault, the size of such an assault would be past some other DDoS assault we’ve found before.

For most of its lifespan, the authors of the Necurs botnet have used it to send spam from infected hosts, usually carrying the Dridex banking trojan, and more recently the Locky ransomware.

“The proxy/DDoS module is quite old,” said MalwareTech, a security researcher that has tracked Necurs’ evolution for years. “I imagine it was put in as a potential revenue stream but then they found there was more money in spam.”

Outside a higher revenue stream the Necurs gang stands to earn from spam, we must also take into consideration other reasons why it’s highly unlikely that we’re going to see DDoS attacks from Necurs.

Necurs creators have put time and cash into building up an expert, very much oiled digital cyber-crime machine. There is no motivation to chance their unfaltering income stream only for running a DDoS-for-contract benefit from which they have just to lose.

Scientifically, it looks bad to pulverize three income streams (Dridex, Locky, and rentable spamming administration) only for making and supporting a DDoS booter benefit.

According to threat intelligence company Anubis Networks,

It seemed to be a simple SOCKS/HTTP proxy module, but as we looked at the commands the bot would accept from the C2 we realized that there was an additional command, that would cause the bot to start making HTTP or UDP requests to an arbitrary target in an endless loop, in a way that could only be explained as a DDOS attack. This is particularly interesting considering the size of the Necurs botnets (the largest one, where this module was being loaded, has over 1 million active infections each 24 hours, A botnet this big can likely produce a very powerfull DDOS attack.

Start/initialization Module by Anubis Networks,

Once the module is loaded by the bot, it performs the following initialization actions:

  1. Parses the parameters and stores them in an internal list of C2 addresses;
  2. Fills a memory structure (see botsettings struct definition below) with:
  3. The BotID – Generated through gathering unique system characteristics;
  4. The internal IP address – Obtained by checking the outbound sockets IP address when connecting to google.com;
  5. The external IP address – Obtained trough HTTP from ipv4.icanhazip.com or checkip.dyndns.org;
  6. The available bandwidth – Obtained by measuring the download speed of the Windows 7 Service Pack 1 file from microsoft;
  7. The (socks/http) proxy service port – The port of the service listening on a random port above 1024;
  8. Checks if the system is behind NAT – By checking if the outbound socket IP is not a local address and that it matches the external IP;
  9. If the system is not behind NAT, the bot starts a SOCKS/HTTP proxy service listening on a random port above 1024.

Also Read :

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has...

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers,...

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders...

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control

GreyNoise has noted a sharp escalation in hacking attempts targeting TVT NVMS9000 Digital Video...

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective...

“Eleven11bot” Botnet Compromises 30,000 Webcams in Massive Attack

Cybersecurity experts have uncovered a massive Distributed Denial-of-Service (DDoS) botnet known as "Eleven11bot."This new...