55808 Trojan Analysis 118
espo812 writes "This analysis of the 55808 trojan that has been circling the internet was just posted on Bugtraq . The good news (i guess?) is that apparentally it is just a proof of concept distributed scanner. The bad news is they think they just caught a copycat version of the origional trojan. ISS also has an analysis."
Related Information (Score:5, Funny)
FYI (Score:1)
Trace source (Score:2)
Or multiple hosts.
Or do networks not like to get together like this?
Re:dupe (Score:1, Flamebait)
Perhaps the "editors" who are aren't reading the front page before posting a story also aren't reading their email from subscribers.
Re:Moderation: Flamebait? (Score:1, Insightful)
Sincerely,
AC
This is quite a clever trojan (Score:5, Informative)
However as its listening in promiscous mode it detects other packets from other trojans that have the network its on as the spoof address and the collects those results.
This is what makes its so hard to find,for one reaons
Rus
Re:This is quite a clever trojan (Score:3, Funny)
1.) quote article
2.) karma
now if we could remove the first step and make it
1.) karma
then we could add
2.) profit!
Re:This is quite a clever trojan (Score:1)
1) Make funny reply about a comment that quotes from the article
2) karma
We can then take it further:
1) Make a (funny?) reply about a reply about a comment that quotes from the article
2) karma *
* or in my case -karma
Re:This is quite a clever trojan (Score:1)
... sell karma on eBay .... (Score:1)
Re:This is quite a clever trojan (Score:3, Interesting)
Indeed, but it seems to be sending them almost randomly across the internet...
Why does it need another trojan to do the job? If it's listening in on the network, why not just send a packet to the host it wants to find information about? Sure, it can still forge the source IP address
Re:This is quite a clever trojan (Score:2)
Once you know the MAC, you could simply use rarp or mac-ping to find out the IP address of the system, what router it is closet too, etc.
So I still think it would be quite easy to find if admins were watching for it on their internal networks (rather than just noticing it at the destination).
Listening for this is HARD (Score:2)
DoItYourself (Score:5, Informative)
If You have enough IPs, You'll see the gimmick ...
Re:DoItYourself (Score:1)
Re:DoItYourself (Score:2, Informative)
You could avoid a lot of trouble, if You installed a more usable operating system before. I expect a networking OS distribution to ship with a packetsniffer.
Re:It's so simple! (Score:5, Funny)
2. ???
3. Jackass!
Re:It's so simple! (Score:1)
In Soviet Russia (Score:1)
Re:It's so simple! (Score:4, Funny)
2. Copy highly moderated comment from previous story
3. ???
4. KARMA!!
New article title? (Score:2)
Disassembling trojans online
It's the Church of the Subgenius (Score:5, Funny)
Uh that's a de-leetified 55808 BTW
Re:It's the Church of the Subgenius (Score:1)
And there have been reference to "DAY 0" in previous articles related to that worm...
coinkidink?
other thoughts (Score:2)
Or maybe it was written by Warez d00ds
Or perhaps Harry Belafonte has a HUGE fan out there somewhere (let's pretend for a moment)
"DA00! DA00! Daylight come and me wan' go home"
OK... sorry... you may mod me down now.
Re:It's the Church of the Subgenius (Score:2)
What's Behind This Odd Dupe? (Score:5, Funny)
The information we've been able to gather leads us to believe that the new article we're seeing is not the original source of the odd Slashdot-generated traffic that has been seen on the Internet, but is rather a "copycat", created to mimic the behavior of another article or story.
CNet article notes conflicting claims (Score:3, Informative)
How does it spread? (Score:2, Interesting)
So the obvious question that nobody is asking is, "who is installing this thing on all these servers?". It would have to be either (a) one guy with access to Unix servers all over the world, (b) a conspiracy of people who have such access, or (c) somebody is hacking into these servers to install the trojan - which seems like a much more newsworthy story, I would think.
Can somebody explain?
Re:How does it spread? (Score:5, Interesting)
Doing some casual scanning at the time, I picked up hundreds of boxes with a root (or other user, local privlege escalation anyone?) shell open on that very port. This was only a couple of hours of scanning; imagine what I could have done given a few weeks.
Re:How does it spread? (Score:2)
Re:How does it spread? (Score:2)
Re:How does it spread? (Score:1)
Could it be possible that the trojan code that they found is only part of the original program minus the infectious portion of the code. ie, self modifying code that deleted the portion of itself that performed the installation of the trojan to make iteself appear NOT to be self pr
Long range network probe (Score:4, Funny)
They can perform packet sniffing and analysis from orbit?
Geez, and to all you naysayers who claim that a reduced two-man crew could not get any science done!
As silly as it may sound... (Score:2, Interesting)
Re:As silly as it may sound... (Score:2, Informative)
Re:As silly as it may sound... (Score:1)
http://www.iana.org/assignments/multicast-addresse s
Re:iptables? (Score:1)
It's just amazing (Score:5, Insightful)
We can all thank our favorite dieties (cowboy Neal included) that economics work out such that those who are most capable of writing a true "nutbuster" malware are typically getting paid to write something more productive!
Most of these worms and viruses are pretty lame - I read someplace that over 90% of worms and viruses never propogate enough to be "viable" - they are too ineffective to spread.
The Internet is an amazingly powerful communications medium - but putting your stuff online is somewhat analogous to putting your stuff in the heart of Harlem - since everywhere has a "front door" there.
The state of security on the Internet is bad, and will get worse before it gets better.
Cool! (Score:2)
Re:Cool! (Score:3, Insightful)
Re:Cool! (Score:3, Interesting)
Ever heard of the following project?? Some good coders that got board⦠Care to imagine that would happen to your daily life and work if the Internet dissolved into chaos for a week or so?
This kind of thought would make the worms and such that we have seen till now the kids toys they are.
Over year ago, with couple of friends, we started writing a project, called
'Samhain' (days ago, on packetstorm, I noticed cute program with s
8. multi vector. (Score:1)
General wormyness.
Mass mailing.
Embeding in HTML files.
Even macro viruses.
6. on polymorphism, why not get the worm to recompile it's self if it finds a compiler on the host.
Re:Cool! (Score:3, Insightful)
Just because you personally aren't suffering from security problems right now means a secure internet wouldn't appear to change things much, but wait until you've been hit with a security related problem that wasted a week of time / lost you $1,000 / lost you your job / destroyed your credit rating / etc. - suddenly a secure internet becomes much more appealing.
I don't want to sound like I'm being harsh on you,
Re:It's just amazing (Score:2)
That's why I pack my
(Okay, not really, but I was looking at a Bersa Thunder
now this is weird... (Score:2, Informative)
AT&T WorldNet Services
12.0.0.0 - 12.255.255.255
MAY SYSTEMS DBA INTERNET CAFFE
12.108.65.64 - 12.108.65.127
Re:now this is weird... (Score:1)
0xDA00 (Score:3, Insightful)
And, uh, that would be a hard system to get any real work done on, given that there are way more than 15 characters in the alphabet.
Re:0xDA00 (Score:2)
Dark Angel 00
http://www.hackology.com/programs/blackangel/gi
Ex-MislTech
Well That does it! (Score:2, Funny)
Y.A.W.B.T.B (Yet Another Windows Bigot To Be)
SARC writeup here.... (Score:5, Informative)
Re:SARC writeup here.... (Score:2)
I read the linked article, but I don't believe I read that right.
Re:SARC writeup here.... (Score:1)
Distribution method? (Score:4, Insightful)
If its very widespread (I not did yet the tcpdump trick :) could mean that it could be attached to something in some way popular, or that is in fact a worm (i.e. taking advantage of some vulnerability to spread, and then do the scanning).
Possibility of Polymorphic (Score:3, Interesting)
modify piece of code . A piece of code that re-writes
itself after stages of accomplishment
Once has has infected, remove the infection method so
as to muddle the tracing process
Like a honey bee leaving it's stinger, but the bee dies
Part of the code is left to do its part, part is gone
If the guy is as smart as the person that wrote the Mr. Leaves
worm then he may have it sending the data to a shell account
harvesting on a encrypted network, both
Product Name Change (Score:5, Funny)
Press Release Number Two: Bill's Bait Shop will now refer to their worms as "Fancy Pink Wriggling Fish Food". Bill's Bait Shop, in an effort to distance itself from the "worms" in the cyber world will now refer to their fine product as "Fancy Pink Wriggling Fish Food".
Re:Product Name Change (Score:1)
How convenient (Score:4, Interesting)
Hmm.
Re:How convenient (Score:2)
Re:How convenient (Score:2)
Re:How convenient (Score:2)
I haven't heard of anything like that since, and there have been a few nasty viruses.
What gives?
Re: (Score:1)
Re:How convenient (Score:2, Insightful)
Technically, viruses and trojans will never prompt OS vendors to produce "better" products. This is because a virus or trojan does not necessarily take advantage of OS flaws. This trojan, for example, looks for existing backdoors and takes advantage of them. BAT.mumu and W32.deborm, of recent fame, attacked weak passwords (not weak OSs).
The *concept* of a trojan or virus implies that an idiot user invokes it. If it's the idiot user that introduces the malicious code to the system, then how is tha
Re:How convenient (Score:2)
Wrong answer. The OS should execute external content in an environment where it can't do anything harmful. That's what mandatory security models are for. Look at NSA Secure Linux.
I Tell Ya, It's Saddam! (Score:2)
He's gonna put a big picture of his mug on the White House Web server with his tongue out and an MP3 playing, "Nyah-Nyah-Nyah-Nyah-Nyah"!
George will have apoplexy and croak! And Saddam beats another George Bush again!
DA00 = Dark Angel 2000 ???? (Score:3, Interesting)
draw your own conclusions
http://www.hackology.com/programs/blackangel/gin fo
http://www.sans.org/y2k/123199-945.htm
Excerpt:
A new Trojan called "Black Angel 2000" has come to our attention and in a beta testing phase by a small group of individuals. Check the text below issued by Munga Bunga taken from alt.2600.hackerz. Speculations from this newsgroup claims it could be a hoax but it is should be taken seriously until proven otherwise.
Enclosed is an extract of the letter published by Mumga Bunga. Apparently, there are some copies of the software in use by beta testers. This group has a web site at http://www.hackology.com which provides more information.
Stephen checked yesterday with some of the best people in the US and no one appears to have any insight about this new Trojan and its capability.
It is possible some of the new unknown ports that have been probed in the past week could be associated with this new Trojan. If anyone within the SANS community have noticed any suspicious files, code, etc that maybe associated with this Trojan, please forward copies and any additional information to mailto:handler@incidents.org
The following is an extract taken from alt.2600.hackerz:
Dear prospective Black Angel user.
This document should contain more information regarding the controversially coded program, "Black Angel"!
Currently I can tell you that apart from the fact that the program is going to be amazing in itself, there shall be 3 new concepts in Black Angel,concepts that have never been exploited in such software before.
One of those concepts is the ability to send the server file in the form of MyPic.jpg (with a jpg icon and a jpg extension). This isn't a big deal for us, and we are not referring to it as "revolutionary"! The file would look like a
Remember, we don't think that's a "revolutionary" concept, not at all, it's nothing. Just another concept which would make Black Angel good software.
The other two concepts relate to the "revolutionary move" that Black Angel is taking. I can not say anything else but the following...
The second concept is to do with interface development and real time interactivity between the client program and the user. Here, we are taking the coded GUI to a new level, definitely a level that almost all of you have never even seen before! We are trying to make the program as "human" as possible, you can expect to see some amazing features.
The third concept is to do with hiding your true Identity on the Internet this is by far the most important concept. If you have heard of the freedom project, I can tell you that freedom is NOTHING compared to the "freedom capabilities" of Black Angel! You would be able to do, what you never thought possible. In addition, it's all, obviously free!
Also, our software is being built from scratch, we are worried about the factor of "time", we are trying to meet the deadline. But it's not easy to code, as you can imagine, and it is not a clone of any other lame software product either (for those of you who made such claims).
I know there are some copies of Black Angel floating around, please dispose of them immediately, distribution of our beta software would not be gladly looked upon! Feel free to distribute this letter, however, to those who request more information. Current state: I'm finishing up the remote explorer and
This is the next thing is spamware. (Score:3, Interesting)
What they want to do is be able to crack say 100 well connected servers. Each of those servers will send out packets with a forged source address of the other hacked servers. Some spamers are putting it all in one packet but its trivial to have sendmail check the buffer size after the HELO has come it. No real MTA will send anything extra. (Don't confuse this with Pipelining which allows the rest of the data to be sent in one packet). So now a spamer must send an inital tcp handshake and a HELO packet. If you keep track of the inital sequence number, you can have another server send the rest of the data.
Most firewalls don't deal with this well. Some MTA's will have issues as well and it may find ways through spam filters. Keep in mind most firewalls only check the 1st packets and once the stream is set up, it just passes the packets through without any other checks.
The solution to this is to get major ISPs to not send packets where both addresses aren't in their space but that will be bad news for dual homed sites.
asteroids? (Score:1)
I looked at this subject and thought it was about a Trojan asteroid. Me: "Why is this important enough for Slashdot? And why isn't it in the science section?" 55808 was discovered in 1994, but I don't know if it's a Trojan or not.
Simple, when you pay... (Score:1)
Re:Simple, when you pay... (Score:2)