Your one-stop web resource providing safety and security information to manufacturers

Global law enforcement agencies dismantled the “Beebone” botnet behind a polymorphic worm known as W32/Worm-AAEH.

The purpose of this worm is to facilitate downloading other malware, including ZBot banking password stealers, Necurs and ZeroAccess rootkits, Cutwail spambots, fake antivirus, and ransomware, said researchers at Intel Security. The worm spreads quickly to new machines and contains a cyclic update routine to replace itself with newer versions that increase the likelihood the worm will remain undetected by security software.

Hotel Router Vulnerability Patched
Router Flaw Allows Loss of Control
Trojan Delivered in Fake Software Update
Huge Botnet Disabled

Over 5 million unique W32/Worm-AAEH samples are available, said Intel Security. In September last year, McAfee Labs telemetry detected more than 100,000 infections on systems in 195 countries with the majority in the United States. More recently, the number of infected systems McAfee Labs detected dropped to 12,000, largely due to effective blocking technology.

The botnet takedown, known as Operation Source, ended up headed by Europol’s European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce (J-CAT). Most EU member states and law enforcement partners around the world coordinated in the action. The Dutch High Tech Crime Unit led the J-CAT effort. The Federal Bureau of Investigation provided valuable support.

Schneider Bold

J-CAT is a multilateral platform established to fight cybercrime. The J-CAT works together on an operational level with public and private entities and academia to identify and mitigate the biggest cyber threats around the world and apprehend the persons responsible for them.

Intel Security, along with Kaspersky Lab and Shadowserver, also provided assistance for this takedown.

Dismantling the botnet’s communications infrastructure is only part of the response. Infected system remediation is equally important. Evasive steps taken by the botnet made this difficult, Intel Security researchers said. The botnet not only changes the worm’s fingerprint many times every day, but it also actively blocks connections to security vendor websites (including

Because W32/Worm-AAEH blocks connections to security software providers, those infected may have difficulty following links to download removal tools. To overcome that hurdle, the team at Shadowserver made a webpage available where users can download tools.

Pin It on Pinterest

Share This