Hackers Serving Rootkits with Bagles 150
Iran Contra writes "Security researchers at F-Secure in Finland have discovered a rootkit component in the Bagle worm that loads a kernel-mode driver to hide the processes and registry keys of itself and other Bagle-related malware from security scanners. Bagle started out as a simple e-mail borne executable and the addition of rootkit capabilities show how far ahead of the cat-and-mouse game the attackers are."
Am I wrong (Score:5, Insightful)
In the end, they're just another piece of cut and paste code for script kiddies.
Re:Am I wrong (Score:2)
Back when I was serious about security (and when it was easier/new) I had test systems running and I gathered all of the code/information/executables I could find and ran them against my systems setup for just this task. The most ineteresting aspect was how easy it was to embed my own payload in script kiddie fasion (knowing shit wasnt required( however I learned the x86 bootstrap via this fasion)), and then how vulnerablethe target systems were. Yep, basically DOS/windows.
Re:Am I wrong (Score:1)
seems like the most pointless thing to put in malware, who runs untrusted executables they recieved in an email as an administrative user?
Some people have learn. It's been ten years of popular email use and ten years of technical people telling users not to run untrusted executables.
It's like telling someone "don't leave that random hitchhiker alone in your house while you go out to work".
I am still amazed that people don't get it. There is still definitly something wrong in the world of
Re:Am I wrong (Score:2)
Re:Am I wrong (Score:2)
Re:Am I wrong (Score:2)
Re:Am I wrong (Score:2)
"I am still amazed that people don't get it."
I realize this isn't the sole reason people don't get it but I believe it would make it a noticeable difference: When will the technical people quit rescuing their friends and family concerning the data on these rooted boxes? I would be willing to bet a considerable amount that if these some people lost all their precious photos, music and e-mails that not only would they take a more proactive stance on security, they may also be more vigil about back-ups too.
D
Re:Am I wrong (Score:2)
Re:Am I wrong (Score:2)
"...There are more secure options out there you know..."
I think you missed my point entirely. So long as these people have that someone to bail them out they have no incentive to listen to advice; be it advised of anti-virus/spy/adware or running alternative software like a different OS even.
Re:Am I wrong (Score:3, Informative)
It's my personal (and professional) opinion that this is likely to become the norm. I give it another year or two before the majority of malware is all rootkit-based. It's far too easy to incorporate rootkit technology,
Re:Am I wrong (Score:2)
Before long... (Score:5, Funny)
Re:Before long... (Score:2)
Your joking has revealed an interesting point though - would it be possible to patent rootkit technology now, or some really restrictive DRM, so that when corporations/the government get around to developing software that wants to restrict our every move, it's already been done/patended?
Re:Before long... (Score:2)
I'm sure if you dropped an autoplay.inf file on the root of the drive, Windows could be tricked into executing it.
Re:Before long... (Score:2)
Re:Before long... (Score:2)
Re:Before long... (Score:2)
Re:Before long... (Score:2)
Re:Before long... (Score:2)
Re:Before long... (Score:2)
Re:Before long... (Score:2)
Re:Before long... (Score:2)
U3 drives even automatically run appplications that are stored on the drive when you execute it (and the code to do that is just unprotected XML files) - it would be perfectly possible to make a virus that replicated via U3.. just that nobody uses it yet so the virus writers haven't bothered.
Re:Before long... (Score:2)
The evolving virus (Score:5, Interesting)
Re:The evolving virus (Score:3, Informative)
In fact as far as underlying technology the current viruses have regressed back to simple non-polymorphic code. Not entirely surprising considering that they are written in a high level language nowdays. If you look at the recent crop there is anything including Delphi and VB used to write them with some EXE compression at the end applied to get the size down to a reasonable value.
I wouldn't call it regressed (Score:2, Informative)
Windows changed that. Malware needs to be recognized by Windows, in some form or else it's not going to get it's messages and it's not going to be able to access the wonderful WinAPI, which will give it more power and make it smaller. There's no point in a spy changing their clothing to disguise themselves if th
Re:The evolving virus (Score:5, Interesting)
Evolving computer programs -- not simple genetic algorithms, but programs that actually "thrive" on CPU time and memory, and compete for these resources -- have been already used to experimentally investigate evolution. Note that there is a serious difference between a genetic algorithm and a truly evolving program. In the former case, the fitness function is precisely defined by the programmer. In the latter, the fitness is just what it is in living organisms -- ability to pass on the genes, or code.
Check out the web page -- http://www.msu.edu/~lenski/ [msu.edu] -- of Richard Lenski, experimental evolutionist (bacteria in a test tube + computer), you will find a nice article on in silicio evolution on his web page. The guy has 4 Nature and 2 Science publications only on the topic of digital evolution.
January
j.
Re:The evolving virus (Score:4, Interesting)
If you allow the code itself to evolve (typically achieved with Lisp or similar cos of the convenient tree structure of the code) then the likelihood is that you can write a better program than will evolve anyway, because so many of the evolved programs are utterly useless. This, of course, is the argument for Intelligent Design, except that the planet really does have unlimited time, and there aren't anti-virus companies constantly trying to sterilise the planet (as far as we know!
Finally, most genetic algorithms require 'sex' type recombination to (randomly and hopefully) whittle away the useless code that has accumulated. This might be a little hard to implement in a cloaking virus - the one thing they don't want is to have any kind of signal that they are there!
All in all, I'll be surprised to see a truly genetic algorithm virus ever. The closest we might see are self tuning ones - eg ones that spot the user is using the machine and back off their spamming activities so that they aren't obvious.
J.
Re:The evolving virus (Score:1)
Huh? I'm not even pro-ID, but this nonsense.
(BTW: I'm not neither ID nor a Darwin zealot. I'd rather have a clue and don't pretend I'm so cool because I know the origin of life. Nobody really knows , *NOBODY*, period)
Re:The evolving virus (Score:2)
The reason evolution works for us and not for computer programs is that the language of our DNA is specifically geared to be useful for evolution. From the protein to the cell to the body, the coding system is designed so that new variations usually produce viable offspring. The fact that someone with an entire extra chromosome (Downs syndrome) can exist is a testament to the robustness of this code.
This isn't surprising. Naturally ev
Re:The evolving virus (Score:5, Interesting)
If you're talking polymorphic characteristics (in viruses or animals), the phrase you're looking for is Heterozygous Advantage [wikipedia.org]. Yes, I do live with a woman who is going to vet school and who has a degree in animal science.
In computer terms, it's going to be hard for random code variations to produce a useful new code segment on their own, for exactly the reasons you describe - there needs to be "sex", or a merging of two codebases, in order to produce surrogate code.
In terms of animals, however, if I may step on my pro-evolution soapbox... This is what all those people at the Institute for Creation Research and Answers in Genesis never talk about. The natural tendancy in animals (at least, and probably in other kingdoms) is for the offspring of a non-homogonous pairing to be *better* than either of the parents. No joke, this is the way it works. Not all the time, but more often than not.
For example, my wife is pretty firmly against the homogonization of the beef industry onto black angus for meat and holstein for milk. The reason being, if you breed nothing but black angus to black angus, you're going to get black angus, which is good, but it will never get better than its parents. If you're breeding black angus and charolais, however, the genetic tendancy is that the offspring most of the time will posess the best characteristics of both parents (breeding and birthing ease with black angus, better meat with charolais).
Anyway, I have to go fix a dead UPS.
~Will
Re:The evolving virus (Score:1)
Re:The evolving virus (Score:2)
Evolution happens via small steps. But, then, I don't pretend to understand how it works; she's the biologist in the family, I just pick up on stuff as she talks.
~W
Re:The evolving virus (Score:3, Interesting)
I'd propose a small correction to what you say: the natural tendency of sexual reproduction is to produce creatures that are either (a)inviable, which typically miscarry or (b) similar or (c) better. This would be analogous to receiving two lots of bad code, one of each, or two lots of good code respectively.
AIUI a surprising number of the offspring of higher animals 'spontaneously' abort without the parent necessarily even knowing about it.
Cheers,
Justin.
Re:The evolving virus (Score:2)
You should just overnight FedEx a new one. Will Dunn. Goats. Fucker.
Re: The evolving virus (Score:2)
I think with the continual increase in CPU power and connectivity, it's just a matter of time before they become feasible.
> The closest we might see are self tuning ones - eg ones that spot the user is using the machine and back off their spamming activities so that they aren't obvious.
Probably the first generation will use mutations to change their AV signatures.
(And that will result in genuine survival of the fittest!)
Re:The evolving virus (Score:2)
Re:The evolving virus (Score:1)
So that's what, security through immaturity? (heh). Somebody writes the scripts the kiddies use. And some of those kiddies grow up.
Re:The evolving virus (Score:1)
Re:The evolving virus (Score:2, Funny)
(it's anti-Microsoft, dammit, feed me karma!
Re:The evolving virus (Score:2)
Maybe because:
a) Hackers are usually interested in money, breaking into computers and not esoteric stuff like genetic algorithms. If they were, they'd be researchers at the MIT or something else, but not hackers.
b) Script kiddies don't have a f***ing clue of what a genetic algorithm is.
I'm certain that it requires an evil mastermind specialized in AI to develop such a virus. And when the day
Professional Attackers (Score:2)
I can only assume that it's not worth doing - ie systems to crack are in such plentiful supply already that there's just no need to bother with real effort.
Re:The evolving virus (Score:5, Insightful)
Changing which registry key a worm modifies, or what files a virus affects will cause wildly varrying effects, 99.9999% of which will cause either no discernable effect, or blue screen the system. This is not a good setup for the GA to figure out what works best.
So despite the similarity in name and function with biological viruses, computer virii (and worms, trojans etc) are not really evolvable, but need to be engineered.
Re:The evolving virus (Score:2)
>cause wildly varrying effects, 99.9999% of which will cause either no discernable
>effect, or blue screen the system. This is not a good setup for the GA to figure
>out what works best.
>
>So despite the similarity in name and function with biological viruses, computer
>virii (and worms, trojans etc) are not really evolvable, but need to be
>engineered.
Interestingly enough, this is also true of meatspace.
Evolu
Re:The evolving virus (Score:2)
You underestimate the elegance of evolution and hence misunderstand it (which probably contributes to your need to attribute our existence to the divine). Yes individual changes produce very little obvious benefit, but the offspring is almost always still viable. This is very important because it means that evolution can (and does) make LOTS of changes within in each generation through sexual reproduction. In so doing it blazes through para
Re:The evolving virus (Score:2)
Hey, Rocky! Want to see me pull an example [wikipedia.org] out of a hat?
Re:The evolving virus (Score:2)
>Hey, Rocky! Want to see me pull an example out of a hat? (link to Flying Squirrel article on Wikipedia)
Flying is a loooooooong way from gliding. No matter what changes you made to Rocky, he could never achieve self-powered climbin
Re:The evolving virus (Score:2)
I think you aren't giving Rocky enough credit. All it would take is for some of the squirrels out there who are born with extra-large gliding-flaps (or whatever they are called) to start moving them just a little bit during flight, to give them a slightly longer glide, and presto! These squirrels can now reach more trees than their non-enhanced neighbors, and thus are mor
Re:The evolving virus (Score:2)
Re:The evolving virus (Score:1, Interesting)
With biological organisms, many genes are copies of existing genes that have been modified over time. One of the fundamental mutation operations is the duplication of a region of dna, which can contain one or more genes. Since having two copies of a gene is not (usually) harmful, this avoids having to evolve new genes from scratch.
So if the virus mutates the registry key that's hidden,
Re:The evolving virus (Score:2)
Re:The evolving virus (Score:2, Interesting)
we're all part of a giant ex
Re:The evolving virus (Score:1)
It's already happened (Score:2)
It's already happened, but not through the intentional use of genetic algorithms. Back in the late 1980's, there was a virus on MSDos that was dirt simple: it would attach itself to two other
Enter natural selection.
As with any repeated copying process,
Dupe! (Score:1, Funny)
Re:Dupe! (Score:1)
As seen on their blog page... (Score:5, Informative)
Re:As seen on their blog page... (Score:3, Funny)
[Off topic] It's not a worm! (Score:5, Interesting)
I mean the picture, of course: http://images.slashdot.org/topics/topicworms.gif [slashdot.org] -- it is an insect larva, not a worm. To be more specific -- probably a butterfly caterpillar.
You want to see a worm? Here -> http://www.desc.med.vu.nl/NL-taxi/ICE/C_elegans1.
January
Re:[Off topic] It's not a worm! (Score:1)
http://en.wikipedia.org/wiki/Inchworm [wikipedia.org]
Re:[Off topic] It's not a worm! (Score:1)
Mmmmm... bagels! (Score:5, Funny)
"Hackers Serving Rootkits with Bagels"
...and I started to think how cool a hacker café would be... then I got to wondering what else you might be able to order at a hacker café:
Trojan Muffins (secret filling might bring surprise!)
DDoS Donuts (very tasty, but eat too many and they gang up on you)
L33t Latté (quintuple espresso with a single shot of milk)
Keylogger Cakes (be careful, they're watching)
Ah well, as they say in these parts 'ah'll get me coat'...
Re:Mmmmm... bagels! (Score:3, Funny)
DDoS Donuts (very tasty, but eat too many and they gang up on you)
L33t Latté (quintuple espresso with a single shot of milk)
Keylogger Cakes (be careful, they're watching)
I think ThinkGeek just found their newest product line.
Re:Mmmmm... bagels! (Score:2)
Just kidding - lol
Re:Mmmmm... bagels! (Score:2, Interesting)
Re:Mmmmm... bagels! (Score:1)
Use RootkitRevealer from SysInternals.com. (Score:5, Informative)
In general, any program SysInternals provides is the best in its field, I've found.
Try the just updated (March 7, 2006) version of Autoruns [sysinternals.com] to find nasty stuff running under Windows.
--
Before, Saddam got Iraq oil profits & paid part to kill Iraqis. Now a few Americans share Iraq oil profits, & U.S. citizens pay to kill Iraqis. Improvement?
Re:Use RootkitRevealer from SysInternals.com. (Score:2)
I blogged Ubuntu LiveCD to explain to noobies (Score:5, Interesting)
My friend is opening up a coffee shop that will have an ap. I will make some copies of Ubuntu for the customers to use.
Now where do I find a dentist for the rootkit I received when I didn't take my own advice
Re:I blogged Ubuntu LiveCD to explain to noobies (Score:2)
Re:I blogged Ubuntu LiveCD to explain to noobies (Score:2)
After booting, select the interface you want to use, on my laptop I have the choice of eter0 wireless, ether1 wired, or ether2 modem. Nice. After choosing static or or another setup, choose Activate. Boom, online with no problems.
Everything works, including sound.
The best part is the live CD has an install icon. If they like it, the live CD is also the install CD. Nice touch to help the migration.
The Edubuntu distro has lots of
Human intervention still needed... (Score:1, Insightful)
So, malware makers are not so much "ahead of the game" as "still reliant on the problem that exists between the keyboard and the chair."
Re:Human intervention still needed... (Score:2)
No. That's the whole point of a worm - it spreads itself without need for user intervention. Typically they exploit holes in server software, using buffer overruns and similar to cause it to execute a copy of their code. They then infect the machine and look for other hosts to spread to.
Bagle and similar email-borne "worms" generally are not true worms, in that they generally do require user intervention. While t
Re:Human intervention still NOT needed... (Score:1)
I don't know where this myth comes from, but you only need to look at Microsoft's own security bulletins to see that this just isn't the case. Unchecked buffers resulting in buffer overflows mean that a cracker can install and run any code he likes, without you ever knowing about it.
For example [eweek.com]
Here is an excerpt:
Websense researchers found that the rigged site exploits the unpatched createTextRange vulnerability to download and install a keystroke logger without any user action.
Worse than that, the
Re:Human intervention still needed... (Score:1)
DING! WRONG ANSWER /. UID is no guarantee of technical acumen.
Seriously, how the hell did this get modded "Insightful"??? Obviously a low
Please educate yourself; http://www.webopedia.com/DidYouKnow/Internet/2004/ virus.asp [webopedia.com]
A new taste treat (Score:3, Funny)
Ever Notice That (Score:1, Offtopic)
The Mac equation is a minimal set of software options and guaranteed interoperability. Its idiot proof. That's what people like about it.
Its also IMHO what sucks about it.
I have a mac, I have a pc and I have an okay linux box.
The mac is for sure the sexiest, but its option poor. Mac users feel free to flame away, but if you can't back it up with a logical comparison, then you've only
Re: Ever Notice That (Score:2)
To all appearences, you posted it under the wrong story. This [slashdot.org] one is about bagelized rootkits; that [slashdot.org] one is about how cool some people think it is to use a Mac.
From the Symantec Web site (Score:1)
Mmm, bagles... (Score:3, Funny)
where's the logic in creating such bad programs? (Score:1)
no matter how hard I try to figure out the reasoning behind creating such devices of invasion, the more confused I get. The only thing that it sounds like is that since they can't physically bully people around they figure they'll do i
Re:where's the logic in creating such bad programs (Score:1)
I, for one, would rather be infamous, than famous.
Re:where's the logic in creating such bad programs (Score:2)
Some people enjoy cre
Rootkits are the new bootsector (Score:3, Insightful)
What we CAN do to relieve this plague is take away the motivation behind viruses. They don't exist just for fun, they serve a purpose.. DDoS is a lucrative racket. If we can somehow make an infected PC less valuable to the attacker, to the point where it's not even worth infecting, the virus threat will slow down to a crawl. Why don't we have more Linux viruses ? Because it's a high-risk, low-potential target. If Microsoft could accomplish the same level of security with the average Windows PC, virus authors would have to go out and get real friggin jobs for once.
Bag*EL* (Score:1)
Hackers? (Score:1)
Re:Hackers? (Score:2)
Virtualization, caging... (Score:2)
I think I saw a virtualization software out there, but I don't remember well.
Those who do not study their history.... (Score:2)
Those who do not study their /. history.... (Score:1)
Re:All together now... (Score:2)
Polly gets a "Bagle" instead. Polly is annoyed!
Re:How to tell if you are a linux fanatic. (Score:2, Funny)
As long as he doesn't fly.. (Score:1)
Re:How to tell if you are a linux fanatic. (Score:1)
the ones in the second category all start with "you can't admit that" - they are craftily worded because they are technically true: I won't admit to things that are blatantly false
I've never met these Nazis of yours? (Score:1, Offtopic)
2. I've actually never yelled anything on slashdot ( by yelling, I'm assuming you mean typing with caps on)
Re:How to tell if you are a linux fanatic. (Score:1, Offtopic)
2. I only yell troll when they are unsubstantiated "facts"
3. I have all the support I need. I can even buy commercial support if I dont. I also have to option to have Dell, or IBM support any system they ship with Linux installed. Thats as much as they do for windows as well.
4. I dont emulate, I run a dedicated win2k server almost once a month to do menial tasks.
5. concede, unless you want to count pixar, dreamworks, and countless other rendering studios that use maya on redhat while usin
Re: (Score:2)
Re:How to tell if you are a linux fanatic. (Score:3, Interesting)
Re:How to tell if you are a linux fanatic. (Score:1)
Re:How to tell if you are a linux fanatic. (Score:2)
Not sure why the GP was modded Offtopic, Funny would have been better.
It's apparent to this user that the AC poster is obviously a closet Linux zealot.
As far as which OS is better, I'm on the fence. I like Linux for the control over the OS it offers, and I like Windows because I can play my games, about all it's good for.