Safeguarding China Operation (Part 1)——Analysis and Response to Major Worm and Botnet Events

The original report is in Chinese, and this version is an AI-translated edition.

On the occasion of the 75th anniversary of the National Day, Antiy CERT has gathered and sorted out the historical work in security event handling, major event analysis, advanced threat analysis, etc. In order to summarize experience, refine rules, and improve deficiencies, our subsequent analysis and response work can more effectively support the national security struggle.

Threat analysis and response is an important capability spectrum of Antiy. Antiy conducts a series of work such as threat perception, capture, analysis, disposal, tracing, reporting, and exposure for attack activities, attack equipment, and threat actors, continuously promotes iterative improvements in core engines and product and service capabilities, and effectively supports public security governance and national security struggles.

In 2004, Antiy established the Antiy Computer Emergency Response Team based on the virus analysis group, which was later renamed Antiy Security Research and Emergency Response Center, namely Antiy CERT. According to the working principle of “starting at the first time, responding to multiple threats at the same time, three systems linkage, and four operation planes coordination”, a working mechanism was established. For major security events and advanced threat response and disposal, an overall combat readiness mobilization mechanism was formed. Antiy has been elected as the national (class A) support unit of the National Internet Emergency Center for eight consecutive terms (sixteen years).

Today we bring you the first part of Antiy’s emergency response and threat analysis work track – responding to and handling major worm propagation and botnet infection events.

With the popularization of the Internet, there have been many large-scale worm outbreaks, including Code Red, Shockwave, and Blaster. These worms spread rapidly, seriously disrupting the operation of Internet infrastructure, and quickly infecting and even controlling a large number of host nodes. In the process of responding to and handling these worms, Antiy gradually formed a set of analysis processes including vulnerability propagation availability analysis, worm infection capture, sample analysis, writing free immunization and disposal tools, and publishing analysis reports. It also enabled Antiy’s earliest entrepreneurs to complete the transformation from traditional virus analysis engineers and development programmers to network security engineers. This formed the emergency awareness foundation of Antiy’s “first-time launch”, and the relevant ability accumulation also formed a good working foundation for Antiy’s subsequent analysis of more complex attack activities such as APT attacks and targeted ransomware attacks.

1.Antiy’s Historical Response to and Handling of Major Worms and Botnet Infections

August 2001

Event“Red Code Ⅱ” worm
Contribution  First capture, analysis report, special detection tool, standard detection tool

Figure 1 ‑1 “Red Code Ⅱ” worm special detection tool
For more information“IIS Worm Red Code” (published in Antiy Technical Articles Compilation (Volume 3))

January 2003

EventSQL Slammer
ContributionFirst capture, propagation mechanism analysis, rapid repair tools

Figure 1 ‑2 Slammer worm patch check tool

March 2003

EventDvldr
ContributionFirst capture, in-depth analysis report, full network survey support, geographic traceability

Figure 1 ‑3 Dvldr worm detection tool


Figure 1 ‑4 Security patch batch distribution tool provided by Antiy for colleges and universities
For more information, seeEmergency Worm.Dvldr Situation Analysis Report “Report on Correlation Analysis of Worm Families Based on Password Cracking Mechanism” (All published in Antiy Technical Articles Compilation (Volume 3))

July 2003

EventBlaster
ContributionCapture warning, in-depth analysis report, special detection, immunity tools

Figure 1 ‑5 Blaster special detection and immunization tool (co-produced by Harbin Institute of Technology and Antiy)

Figure 1 ‑6 MSBlast immunization procedure

August 2003

EventWelChia
ContributionCapture warning, analysis report, immunization tool, network management batch disposal tool

Figure 1 ‑7 AV Lecah’s popular worm special detection tool adds protection against WelChia worms

May 2004

EventSasser
ContributionCapture warning, analysis report, special detection tool, network sky homology analysis and source location determination

Figure 1 ‑8 AV Lecah’s popular worm special detection tool adds protection against Sasser worms
For more information, see“Virus Homology Analysis Based on Typical Development Methods and Coding Psychology” (published in Antiy Technical Articles Compilation (I))

January 2005

EventRBOT and SDBOT botnets
ContributionCapture warning, analysis report, special detection tool, provide clues to capture the author

Figure 1 ‑9 AV Lecah’s popular worm special detection tool adds protection against RBOT and SDBOT botnets

August 2006

EventMocbot
ContributionSpecial detection tools, monitoring and analysis, large-scale containment solutions

Figure 1 ‑10 AVL PK Ultimate Special Detection Tool detects and kills popular worms and Trojans at the time

December 2006

EventFujacks
ContributionCapture warning, analysis report, special detection tool

Figure 1 ‑11 “Fujacks” virus special detection tool

May 2017​

EventWannaCry
ContributionFirst release of complete analysis, special detection, immunity tools, memory key extraction (recovery) tools, and traceability support

Figure 1 ‑12 WannaCry special detection tools


Figure 1 ‑13 WannaCry immunity tool


Figure 1 ‑14 WannaCry file decryption tool
For more informationAntiy’s in-depth analysis report on the ransomware worm “WannaCry” Antiy’s protection manual for dealing with the ransomware “WannaCry” Antiy analyzes the payment and decryption process of the ransomware worm WannaCry Antiy worm-like ransomware WannaCry immunity tool FAQ 4 In response to the ransomware “WannaCry”, Antiy released a boot guide

June 2017​

EventDark Cloud III
ContributionAnalysis report, special detection tool

Figure 1 ‑15 Dark Cloud III special detection tool
For more informationAntiy’s sample analysis and solutions for “Dark Cloud III”

January 2018​

EventGafgyt
ContributionJointly released with Telecom Cloud, infection status
For more informationUncovering the story behind the IoT botnet Gafgyt family and the NetCore 53413 backdoor

August 2019​

eEventMykings
ContributionRelease analysis reports and infection status
For more informationAnalysis report on the recent activities of Mykings botnet

April 2020​

EventTsunami
contributeRelease analysis report and global infection situation
For more informationAnalysis of the precise deployment of Tsunami botnet and “Magic Shovel” mining trojan

September 2022​

EventLilith
ContributionPublish analysis reports and traceability background
For more informationFollow-up analysis of Lilith botnet and the Jester hacker group behind it

November 2022 – March 2023

EventMining
ContributionRelease analysis reports and mining topics
For more informationAnalysis of Typical Mining Families Part 4: LemonDuck Mining Botnet Analysis of Typical Mining Families Part 3: Sysrv-hello Mining Worm Analysis of Typical Mining Families Part 2: TeamTNT Mining Organization Analysis of Typical Mining Families Part 1: Outlaw Mining Botnet

December 2023

EventMirai
ContributionAnalysis reports, new variants
For more informationAnalysis of Mirai botnet variant “Aquabot” and Yayaya Miner mining trojan

Appendix: About Antiy

Antiy is committed to enhancing the network security defense capabilities of its customers and effectively responding to security threats. Through more than 20 years of independent research and development, Antiy has developed technological leadership in areas such as threat detection engines, advanced threat countermeasures, and large-scale threat automation analysis.

Antiy has developed IEP (Intelligent Endpoint Protection System) security product family for PC, server and other system environments, as well as UWP (Unified Workload Protect) security products for cloud hosts, container and other system environments, providing system security capabilities including endpoint antivirus, endpoint protection (EPP), endpoint detection and response (EDR), and Cloud Workload Protection Platform (CWPP) , etc. Antiy has established a closed-loop product system of threat countermeasures based on its threat intelligence and threat detection capabilities, achieving perception, retardation, blocking and presentation of the advanced threats through products such as the Persistent Threat Detection System (PTD), Persistent Threat Analysis System (PTA), Attack Capture System (ACS), and TDS. For web and business security scenarios, Antiy has launched the PTF Next-generation Web Application and API Protection System (WAAP) and SCS Code Security Detection System to help customers shift their security capabilities to the left in the DevOps process. At the same time, it has developed four major kinds of security service: network attack and defense logic deduction, in-depth threat hunting, security threat inspection, and regular security operations. Through the Threat Confrontation Operation Platform (XDR), multiple security products and services are integrated to effectively support the upgrade of comprehensive threat confrontation capabilities.

Antiy provides comprehensive security solutions for clients with high security requirements, including network and information authorities, military forces, ministries, confidential industries, and critical information infrastructure. Antiy has participated in the security work of major national political and social events since 2005 and has won honors such as the Outstanding Contribution Award and Advanced Security Group. Since 2015, Antiy’s products and services have provided security support for major spaceflight missions including manned spaceflight, lunar exploration, and space station docking, as well as significant missions such as the maiden flight of large aircraft, escort of main force ships, and Antarctic scientific research. We have received several thank-you letters from relevant departments.

Antiy is a core enabler of the global fundamental security supply chain. Nearly a hundred of the world’s leading security and IT enterprises have chosen Antiy as their partner of detection capability. At present, Antiy’s threat detection engine provides security detection capabilities for over 1.3 million network devices and over 3 billion smart terminal devices worldwide, which has become a “national-level” engine. As of now, Antiy has filed 1,877 patents in the field of cybersecurity and obtained 936 patents. It has been awarded the title of National Intellectual Property Advantage Enterprise and the 17th (2015) China Patent Excellence Award.

Antiy is an important enterprise node in China emergency response system and has provided early warning and comprehensive emergency response in major security threats and virus outbreaks such as “Code Red”, “Dvldr”, “Heartbleed”, “Bash Shellcode” and “WannaCry”. Antiy conducts continuous monitoring and in-depth analysis against dozens of advanced cyberspce threat actors (APT groups) such as “Equation”, “White Elephant”, “Lotus” and “Greenspot” and their attack actions, assisting customers to form effective protection when the enemy situation is accurately predicted.