Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security The Internet

Relentless Web Attack Hard To Kill 218

ancientribe writes "The thousands of Web sites infected by a new widespread SQL injection attack during the past few days aren't necessarily in the clear after they remove the malicious code from their sites. Researchers from Kaspersky Lab have witnessed the attackers quickly reinfecting those same sites all over again. Meanwhile, researchers at SecureWorks have infiltrated the Chinese underground in an attempt to procure a copy of the stealthy new automated tool being used in the attacks."
This discussion has been archived. No new comments can be posted.

Relentless Web Attack Hard To Kill

Comments Filter:
  • Whatever happened (Score:5, Insightful)

    by RaceProUK ( 1137575 ) on Wednesday November 12, 2008 @03:18PM (#25737111)
    to fixing the hole? It's like fixing a car coolant leak by pouring more water in the radiator.
  • by sam0737 ( 648914 ) <samNO@SPAMchowchi.com> on Wednesday November 12, 2008 @03:21PM (#25737171)

    At the end of the day it's the problem of plugins...I mean, besides the fact that the website is being infected, it's the flaws and vulnerabilities of the ActiveX/Browser plugins that allow this kind of activity to be profitable.

    Just yet another reason, besides bandwidth, to get Flashblock.

    And install as few as browsers plugins/ActiveX as possible.

  • This disgusts me (Score:4, Insightful)

    by 77Punker ( 673758 ) <spencr04 @ h i g h p o i n t.edu> on Wednesday November 12, 2008 @03:28PM (#25737323)

    I develop web applications for a living right now and as someone who's only been in this game for a few months, this disgusts me. I already know how to prevent SQL injection with prepared statements. It's easy to do and requires no extra knowledge, so why doesn't everyone do this?

  • Re:Kaspersky (Score:4, Insightful)

    by martinw89 ( 1229324 ) on Wednesday November 12, 2008 @03:31PM (#25737377)

    ...AVG...

    <mechanic>Well there's your problem.</mechanic>

  • by Anonymous Coward on Wednesday November 12, 2008 @03:32PM (#25737391)
    You might know, but the intern who developped the crappy PHP4 app 8 years ago did not, and it would cost too many man days to fix the code.
  • by Rycross ( 836649 ) on Wednesday November 12, 2008 @03:33PM (#25737411)

    The problem is a frightening amount of training material on the web uses concatenated SQL strings to teach SQL. Pull up your average PHP/.Net/Java SQL tutorial and odds are that it will be concatenating strings. Throw that in with the fact that roughly half of the programmers reading that are going to be below average, and there you go.

  • by Aoet_325 ( 1396661 ) on Wednesday November 12, 2008 @03:36PM (#25737453)

    "The toolkit is protected with a layer of digital rights management and appears to be sold mainly in China. "

    this is why I don't believe in "Tusted" computing.
    When software or hardware are used to take control of a computer away from that computer's owner bad things will happen.

  • Re:Kaspersky (Score:5, Insightful)

    by Arancaytar ( 966377 ) <arancaytar.ilyaran@gmail.com> on Wednesday November 12, 2008 @03:43PM (#25737535) Homepage

    It's a bloody SQL injection attack. I'd like to see your virus checker automatically rewrite your web application to use input filtering.

    What these people need is a real web application instead of some self-built PHP script - not a virus scanner, whether free or expensive.

  • by corsec67 ( 627446 ) on Wednesday November 12, 2008 @03:45PM (#25737569) Homepage Journal

    Throw that in with the fact that roughly half of the programmers reading that are going to be below average

    Um for anything that is approximately normally distributed,... half of the X are going to be below average. (Especially if it is a continuous variable and you use the median)

  • by Anonymous Coward on Wednesday November 12, 2008 @03:54PM (#25737703)

    I say that fully half of programmers will be below median assuming theres an even number of programmers.
    All bets are off if theres an Odd number of programmers.

  • by Emb3rz ( 1210286 ) on Wednesday November 12, 2008 @04:21PM (#25738083) Homepage

    The idea of a SQL Injection attack is to pass a parameter in such a way that it changes the structure of the query itself. Typical beginner's SQL query:

    sql = "SELECT * FROM Users WHERE Username = '" & Request.Form("Username") & "' AND Password = '" & Request.Form("Password") & "';"

    This uses 'String Concatenation' to build a line of text from several smaller parts. The completed string is then, in this example executed by a database. A new query is dynamically created and executed based on the text passed to it. Thus, we are able to at this point change what query will be run. Form data:

    Username = "Admin"
    Password = "x' OR 'e' = 'e"

    So when the string is being put together, we get:

    SELECT * FROM Users WHERE Username = 'Admin' AND Password = 'x' OR 'e' = 'e';

    Certainly, even with no programming experience, one can see that the letter E will always be equivalent to the letter E. Thus, any validation of the password will return a false positive.

    Prepared statements avoid this whole deal by only allowing you to pass parameters. The query is already set in stone. You cannot change how it basically works, only its criteria / filtering / etc. A prepared statement would execute basically:

    SELECT * FROM Users WHERE Username = "Admin" AND Password = "x' OR 'e' = 'e";

    Since the query does not change dynamically when it's executed as a prepared statement, you can't add your logical 'OR' operator after having broken out of your parameter. You just get no rows returned, as should be the case.

  • by 77Punker ( 673758 ) <spencr04 @ h i g h p o i n t.edu> on Wednesday November 12, 2008 @04:24PM (#25738129)

    Kaspersky can't figure it out because a virus scanner can't fix a web application. Fixing SQL injections is beyond their realm.

    Travelocity can't figure it out because their developers must suck. Travelocity is well-known because they have a decent service, not because the software that runs the service is really great software.

  • by delirium28 ( 641609 ) on Wednesday November 12, 2008 @04:24PM (#25738135) Journal
    They're most likely trying to find a solution that doesn't require them to revisit and re-code a large portion of their site. They most likely want a band-aid solution rather than fix the underlying problem.
  • by Emb3rz ( 1210286 ) on Wednesday November 12, 2008 @04:26PM (#25738159) Homepage

    You're working off of the false assumption that security is about knowledge.

    We know abundantly well exactly how SQL injection attacks occur, and we also have many tools at our disposal to -absolutely- prevent them. What we don't have is the cooperation or effort from programmers on a widespread basis. Many are simply too lazy to research and implement reasonable security measures. It's easier to pretend that there are no ways whatsoever that anything can go wrong with your code because when you tested it it worked right. This willfull turning a blind eye to well-established security caveats is what has given us this terrible and prevalent security problem. It's easier to write code that checks nothing, it's quicker to do so, and it requires less think-juice on the part of the lazy programmer.

  • by CodeBuster ( 516420 ) on Wednesday November 12, 2008 @05:04PM (#25738641)

    Throw that in with the fact that roughly half of the programmers reading that are going to be below average, and there you go.

    That is what comes of outsourcing and offshoring especially, but there are still managers out there who refuse to acknowledge what I like to call the Iron Law of Software Development or more generally the Project Triangle [wikipedia.org] (good, fast, cheap...pick two).

  • Trust (Score:2, Insightful)

    by mfh ( 56 ) on Wednesday November 12, 2008 @06:00PM (#25739373) Homepage Journal

    Okay keep using Noscript. I don't have a problem with that, but be warned that you are not fully protected by Noscript when the website you TRUST is attacked by an exploit like SQL injection, because YOU TRUST THAT WEBSITE.

    White-lists are better than no-lists, but they aren't perfect.

  • McColo? (Score:3, Insightful)

    by Ungrounded Lightning ( 62228 ) on Wednesday November 12, 2008 @06:18PM (#25739627) Journal

    I wonder how many of the malicious servers the injected SQL dumped the users into were hosted on McColo - and are thus now not available?

  • Re:noscript (Score:3, Insightful)

    by daveime ( 1253762 ) on Thursday November 13, 2008 @05:27AM (#25744453)

    Yes, we should stick to the old tried and true "overload the server and piss off the user" method of the 1990's.

    Name: Dave
    Country : Thailand
    Telephone : 12345678
    Date of Birth : 29/02/2000
    [SUBMIT]

    Oops' looks like some problems with your submission - please correct the following :-

    Please supply your Firstname AND Surname ...

    Name : Dave Mullen
    [SUBMIT]

    Oops' looks like some problems with your submission - please correct the following :-

    You are from Thailand, where people don't always HAVE surnames - please just supply your Name ...

    Name : Dave
    [SUBMIT]

    Oops' looks like some problems with your submission - please correct the following :-

    Please supply a full telephone number with area code ...

    Telephone : 0066 12345678
    [SUBMIT]

    Oops' looks like some problems with your submission - please correct the following :-

    Country code should start with + ...

    Telephone : +66 12345678
    [SUBMIT]

    Oops' looks like some problems with your submission - please correct the following :-

    Please supply an area code ...

    Telephone : +66 99 12345678
    [SUBMIT]

    Oops' looks like some problems with your submission - please correct the following :-

    February 29th is not a valid date because 2000 is not a leap year.

    BY WHICH TIME, *IF* THE USER IS STILL HERE, YOU HAVE THOROUGHLY PISSED HIM OFF, AND MADE NO LESS THAN 6 SUBMISSIONS TO THE SERVER FOR SOME CRAPPY VALIDATION THAT COULD HAVE ALL BEEN TRAPPED ON THE CLIENT SIDE.

    If that's the web you want, then it's your choice I suppose.

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...