Jump to content

McColo

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Ub3rst4r (talk | contribs) at 03:32, 27 April 2009 (added info from state of report released by symantec). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Effect of McColo takedown on spam volumes, from SpamCop.

McColo was a San Jose-based web hosting service provider.[1] In late 2008, the company was shutdown by the two upstream providers, Global Crossing and Hurricane Electric, due to the fact that significant amount of malware and botnet has been trafficking from McColo servers.[1]

Malware traffic

At the time of termination of its upstream service on November 11, 2008, it was estimated that McColo customers were responsible for a substantial proportion of all email spam then flowing[2] and subsequent reports claim a two-thirds or greater reduction in global spam volume.[3] This reduction had been sustained for some period after the takedown.[4] McColo was one of the leading players in the so-called "bulletproof hosting" market — ISPs that will allow servers to remain online regardless of complaints.

According to Ars Technica and other sources, upstream ISPs Global Crossing and Hurricane Electric terminated service when contacted by Brian Krebs and The Washington Post’s Security Fix blog,[5][6] but multiple reports had been published by organisations including SecureWorks, FireEye and ThreatExpert, all naming McColo as the host for much of the world's botnet traffic.[7][8][9][10] According to Joe Stewart, director of malware research for SecureWorks, the Mega-D, Srizbi, Pushdo, Rustock and Warezov botnets all hosted their master servers at McColo; numerous complaints had been made but McColo simply moved offending servers and sites to different subnets. Spamhaus.org reportedly finds roughly 1.5 million computers infected with either Srizbi or Rustock sending spam in an average week.

Following the shutdown, details began to emerge of the ISP's other clients, which included distributors and vendors of child pornography and other criminal enterprises, including the notorious Russian Business Network.[11]

McColo gained reconnection briefly on 19 November 2008 via a backup connection agreement common in the industry, but was rapidly shut down again.[12]

The McColo takedown especially affected Srizbi, the world's largest botnet, with around 500,000 infected nodes as of November 2008.[13] The botnet is reported to be capable of sending around 60 billion spam messages a day, which is more than half of the global total of 100 billion.[14]

Symantec's monthly state of spam report for April 2009, stated that spamming was now back to what it was before McColo was taken offline. Thanks to botnets being created and old ones being brought back online, it estimated that about 85 percent of all email traffic is spam. [15][16]

References

  1. ^ a b Krebs, Brian (2008-11-12). "Host of Internet Spam Groups Is Cut Off". Washington Post. Retrieved 2009-01-27.
  2. ^ McColo goes silent, The Register, 12 November 2008
  3. ^ Spam Volumes Drop by Two-Thirds After Firm Goes Offline, Washington Post Security Fix blog, November 12, 2008
  4. ^ Spam Back to 94% of All E-Mail, The New York Times "Bits" Blog, 31 March 2009
  5. ^ A Closer Look at McColo, Washington Post Security Fix blog
  6. ^ Spam sees big nosedive as rogue ISP McColo knocked offline, Ars Technica, 12 November 2008
  7. ^ secureworks threat analysis
  8. ^ FireEye threat analysis
  9. ^ ThreatExpert threat analysis
  10. ^ SecureWorks threat analysis
  11. ^ Washington Post, 12 November 2008
  12. ^ McColo reconnect highlights network security gap, Ars Technica, 20 November 2008
  13. ^ Srizbi returns from the dead, The Register, 26 November 2008
  14. ^ Srizbi grows into world's largest botnet, CSO Online, May 13 2008
  15. ^ Spammers recovering from McColo shutdown
  16. ^ State Of Spam for April 2009