First a brief history
When malware writers started using the Internet eons (about 10 human years) ago to write their programs to infect computers they distributed them by getting accounts at 'free' web hosting sites or uploaded the malware as shareware, freeware or even demo ware to great sites like TUCOWS
(http://www.tucows.com/) with a great write up and let people download and infect themselves. This made it pretty easy to figure out where the infection was coming from and by working with the ISP or webmaster get the malware removed from the site. TUCOWS and other download sites also implemented a regular anti-virus scan of all files uploaded so that any malware would be stopped or found before it had a chance to be downloaded by some unsuspecting person unleashing it's payload of destruction. You can see why the malware writers have moved on to different distribution channel as it is easy to chop the head off the infection and stop it in its tracks.
The popular technique for the last while is 'Fast Flux' where an group of infected PC's act as a proxy layer between the web server hosting the malware and the PC's that are going to be infected. This proxy layer is called the 'Fluxnodes'. You will have seen this in the recent 'Storm Worm' spam runs where the e-mail to you consists of a brief subject line and a link to an IP address. When you click on the link in the e-mail your computer connects to the proxy software running on an already infected PC and it then goes out and get's the content, including the malware that will end up infecting your PC, from the real source. This makes it harder to track down the real source of the infection as you now have to try and contact the IT people of the computer in the middle (the proxy) and get them to check their log files to find out where the malware content is really coming from. They may be too busy to respond or they may not even have the logs required to track the source down and meanwhile the 'Storm Worm' or some variation continues to send out millions of e-mail messages getting more PC's infected and adding more pawns to that proxy layer insulating the bot herder from the security professionals that are trying to stop the infection. As hard as it is to coordinate with the IT departments of the infected proxy layer it does happen often enough that the real source of the malware files is found and is shut down. This does not make the bot herders happy as now they have to start building up their bot nets all over again or redirect their proxy pawns to a second source of infected files. This takes time and while this transition is going on the bot network is down and not doing the bidding of the herder thus the evolution of 'Fast Flux' to 'Hydra Flux'.
Hydra Flux is the same basic idea as Fast Flux but with the addition of many heads - like the Lernaean Hydra or many headed serpent in Greek mythology - and just like the ancient snake with many heads you can cut off one of the heads of the modern 'Hydra Flux' without killing the beast. The Proxy layer talks to many sources of infection, the mother ships of the Internet Storm Article, so that if one gets found out and stopped the proxy layer has a backup. This is a very resilient hosting structure and could be called a great example of 'cloud computing'.
So what can we do to stop the infections and take back the internet streets for us 'honest folk'? The first thing we need to do is ensure that we don't settle for setting up our corporate firewall's to the point that they work for both us and the malware writers. Too many firewall's are setup to stop the traffic coming from the Internet to the LAN but allow anything and everything from the LAN to flow to the Internet. If you have a corporate mail server then the mail server should be the only system that has SMTP access to the Internet and you can block all other connections from the LAN to any Internet host on port 25. If the firewall has Universal Plug and Play (UPnP) disable it if at all possible because of the security holes it introduces into your network. Enable the Intrusion Detection of your firewall if it has that capability and use it on the inside of your network.
If you don't have a firewall that can do IDS get one that can or add a transparent gateway device like the Barracuda Web Filter that looks for infected traffic originating on the inside of your network and can both block it and report to you that you have an infection problem so you can take care of it. The Barracuda Web Filter also has the log files that would allow you to track down the real source of the malware helping cut off one of the many heads of the Hydra Flux botnet. For those of us IT professionals that are called on by family and friends to fix their home computer problems don't allow them to connect to the Internet without a hardware firewall or allow their anti-virus protection to run out. Teach them how to both do and test a reliable backup and then get them to do monthly patches and software updates or do it for them though I believe it is better to education them to do it, why it is important, and check with them on a regular basis to see that they are doing the right thing than get them used to you 'just taking care of things' for them. Ok - you can just take care of Grandma's PC - but still tell her that it is important to play safe on the Internet.
With the evolution of the Fast Flux to the Hydra Flux bot net you can expect the onslaught of spam to continue but with these simple techniques we can make it harder for the bot herders to take over our PC's and not contribute to the problem.
- Shaun
More Info:
Hydra Flux
Fast Flux
UPnP