Skip to main content
Topic: Dutch police take down hornets' nest of DDoS botnets (Read 4372 times) previous topic - next topic

Dutch police take down hornets' nest of DDoS botnets

Dutch police take down hornets' nest of DDoS botnets

Police seize servers from bulletproof hosting provider that harbored tens of DDoS botnets.

https://www.zdnet.com/article/dutch-police-take-down-hornets-nest-of-ddos-botnets/

https://outline.com/wzXb9y

https://www.lowendtalk.com/discussion/160563/kv-solutions-bv-have-probably-been-raided

https://translate.google.com/translate?sl=nl&tl=en&u=https%3A%2F%2Fwww.politie.nl%2Fnieuws%2F2019%2Foktober%2F2%2F11-servers-botnet-offline.html

Quote
Quote
Dutch police have taken down this week a bulletproof hosting provider that has sheltered tens of IoT botnets that have been responsible for hundreds of thousands of DDoS attacks around the world, ZDNet has learned.

Servers were seized, and two men were arrested yesterday at the offices of KV Solutions BV (KV hereinafter), a so-called bulletproof hosting provider, a term used to describe web hosting providers that ignore abuse reports and allow cybercrime operations to operate on their servers.

For two years, the company has provided hosting infrastructure to internet criminals, and has been one of the most serious offender at that, hosting all sorts of badies, from phishing pages to vulnerability scanners, and from crypto-mining operations to malware repositories.

But above all, the company has made a reputation in cyber-security circles for being a hotspot for DDoS botnets, with cyber-criminals renting KV servers to host their bot scanners, malware, and command-and-control (C&C) servers, knowing they'd be safe from "harm."
KV hosted all sorts of botnets

This year alone, KV hosted tens of these DDoS botnets, most of which have been compiled in this Twitter mega-thread by threat intelligence firm Bad Packets LLC.

The botnets have been created using so-called "IoT malware," which is malware designed to infect Linux-based operating systems that run on routers and other "smart" (Internet of Things) devices.

In an interview with ZDNet, Bad Packets said the botnets operating from KV's infrastructure had been observed in the past year scanning the internet and looking to infect a wide range of devices, such as:

    ASUS routers
    AVTECH IoT devices
    GPON routers
    Fritz!Box routers
    Huawei routers
    JAWS web servers (generic IoT)
    MikroTik routers
    Netgear routers
    ZTE cable modems

While the vast majority of DDoS botnets operating on KV's infrastructure had been seen running a version of the Mirai IoT malware, the hosting firm has also harbored botnets built with all sorts of other IoT malware, encompassing almost all IoT malware variants seen in the past year:

    Fbot
    Gafgyt
    Hakai
    Handymanny
    Mirai
    Moobot
    Tsunami
    Yowai

The vast majority of these botnets were operated by "script kiddies," or "skidz," a term meant to ridicule untalented hackers who use ready-made or automated tools to build botnets.

However, some were also operated by some of today's most talented hackers. For example, Subby, a notorious IoT malware coder and botnet operator, was known to use KV infrastructure.

In addition, some of these botnets also reached huge sizes, accounting for tens of thousands of infected devices; eventually drawing the attention of cyber-security firms, notably Trend Micro and Qihoo 360's Netlab, which spent time and resources in digging into their operations.
KV hosted DDoS booter services

Furthermore, KV also served as a hosting provider for some botnets that were part of DDoS-for-hire (DDoS booter) services, according to Troy Mursch, co-founder of Bad Packets.

"We've been monitoring malicious activity originating from their network for a year now," Mursch told ZDNet in an interview today.

"The vast majority of malware samples hosted by them were used for DDoS attacks. This goes hand-in-hand with them hosting the botnet command-and-control (C2) servers as well. It was a one-stop shop for DDoS/booter services," Mursch added.

All in all, Mursch said that "in 2019, Bad Packets detected 440,261 exploit attempts originating from and/or referencing malware payloads hosted by KV Solutions."

Victims of DDoS attacks that originated from KV-hosted botnets include Ubisoft, Wish.com, and about every major cloud and web hosting provider you can name, such as AWS, Microsoft Azure, OVH, AT&T, Comcast, Cox, Charter, and China Unicom; just to name a few.
KV never took action against bad customers

But this high concentration of DDoS firepower on the infrastructure of one single company couldn't have gone unnoticed forever.

Several security researchers and sources in the web hosting community have told ZDNet that the company "had it coming."

KV administrators sarcastically ignored abuse reports from everyone and allowed their customers to run rampant.

Complaints to Dutch authorities started coming in last year, and many fellow web hosting providers and security researchers have been gagged to silence this whole year, as Dutch cyber police slowly gathered the evidence they needed to take down the company.
Two arrested

Dutch police finally stepped in and raided the company's offices yesterday, Tuesday, October 1, at about the time the company posted a message on its Facebook page, announcing "a malfunction," a coded message to customers to wipe their servers.

Dutch authorities made the raid public today, in a press release, which also mentioned the arrests of two suspects, a 24-year-old from Veendam, and a 28-year-old from Middelburg.

The two -- Marco B., 24, from Veendam, and Angelo K., 28, from Middelburg -- are believed to be the founders of a network of five interconnected companies. Dutch privacy laws do not permit revealing a suspect's full name, so we honored this requirement for our reporting.

Marco B. and Angelo K. are listed as the owners of two web hosting firms, namely KV Solutions BV and Lifehosting BV, but also three IT companies, Bos IT Holding BV, Kreikamp IT Holding BV, and KBIT Holding BV, all having controlling rights in each other, according to public information from the Dutch Chamber of Commerce.

All the websites and domains of the five companies listed above are now down. Phone calls to contact numbers listed on cached versions of these sites were not answered.

While the Dutch police statement published today only mentions "the hosting of IoT botnets," KV's infrastructure hosted a lot of other malware as well. KV's public IP block was 185.244.25.0/24. Any malware operation that had servers in this address space saw some unfortunate downtime today.

As it happened in other raids of bulletproof hosting providers, the data from the seized servers will most likely lead to other arrests, such as botnet operators and malware authors.
                  


Re: Dutch police take down hornets' nest of DDoS botnets

Reply #2
Their DNS names for their 191 IP's they were utilizing at the time

185.244.25.1    sw-rhynix.kvsolutions.nl    
185.244.25.2    test.kvsolutions.nl    
185.244.25.5    ns1.travelberry.nl    
185.244.25.6    ns2.travelberry.nl    
185.244.25.7    ns1.kvsolutions.nl    
185.244.25.8    ns2.kvsolutions.nl    
185.244.25.11    centovacast.kvsolutions.nl    
185.244.25.20    crew.kbitholding.nl    
185.244.25.67    fuckmeintheass.com    
185.244.25.82    ts3.kvsolutions.nl    
185.244.25.84    84.25.244.84.in-addr.arpa    
185.244.25.88    88.25.244.185.in-addr.arpa    
185.244.25.101    dedi01.customers.kvsolutions.nl    
185.244.25.102    dedi03.customers.kvsolutions.nl    
185.244.25.103    dedi05.customers.kvsolutions.nl    
185.244.25.104    dedi07.customers.kvsolutions.nl    
185.244.25.105    dedi08.customers.kvsolutions.nl    
185.244.25.106    dedi09.customers.kvsolutions.nl    
185.244.25.107    dedi10.customers.kvsolutions.nl    
185.244.25.108    dedi06.customers.kvsolutions.nl    
185.244.25.122    185.244.25.122.in-addr.arpa    
185.244.25.128    1.myth.wtf    
185.244.25.129    2.myth.wtf    
185.244.25.130    3.myth.wtf    
185.244.25.131    4.myth.wtf    
185.244.25.135    135.25.244.185.in-addr.arpa    
185.244.25.137    canthitxcfk.xyz    
185.244.25.139    5.myth.wtf    
185.244.25.141    6.myth.wtf    
185.244.25.142    vex.cx    
185.244.25.143    8.myth.wtf    
185.244.25.144    9.myth.wtf    
185.244.25.149    10.myth.wtf    
185.244.25.150    bs1.hostnamepxssy.nl    
185.244.25.151    hallo.jemoeder.com    
185.244.25.152    12.myth.wtf    
185.244.25.155    ns1.bullethost.nl    
185.244.25.158    185.244.25.158.in-addr.arpa    
185.244.25.161    15.myth.wtf    
185.244.25.162    sandniggawashere    
185.244.25.164    cnc.ddos-with.me    
185.244.25.165    ns-hosting-mia    
185.244.25.166    ns-hosting-2-sc    
185.244.25.168    ns-hosting-1-sc    
185.244.25.171    host.bullethost.nl    
185.244.25.173    173.25.244.185.in-addr.arpa    
185.244.25.174    herro.skid.com    
185.244.25.176    alvin.in-addr.arpa    
185.244.25.178    178.25.244.185.in-addr.arpa    
185.244.25.179    185.244.25.179.hackme.wtf    
185.244.25.180    180.25.244.185.in-addr.arpa    
185.244.25.181    kurdcapital    
185.244.25.183    183.25.244.183.in-addr.arpa    
185.244.25.184    revsec.io    
185.244.25.192    mhmmm    
185.244.25.200    200.25.244.185.in-addr.arpa    
185.244.25.211    niggershallbegay.google.com    
185.244.25.216    glztch.fbi.gov    
185.244.25.228    protected.subby.net    
185.244.25.231    klokus    
185.244.25.237    237.25.244.237.in-addr.arpa