Sober Code Cracked 303
An anonymous reader writes "The algorithm used by the Sober worm to 'communicate' with its author has been cracked. According to F-Secure, it can now calculate the exact URLs the worm would check on a particular day. Mikko Hyppönen, chief research officer at F-Secure, explained that the virus author has not used a constant URL because authorities would easily be able to block it. From the article: "Sober has been using an algorithm to create pseudorandom URLs which will change based on dates. Ninety nine percent of the URLs simply don't exist...however, the virus author can precalculate the URL for any date, and when he wants to run something on all the infected machines, he just registers the right URL, uploads his program and BANG! It's run globally on hundreds of thousands of machines," Hyppönen said. Sober is expected to launch itself again on January 5, 2006."
code cracked, communication revealed (Score:5, Funny)
Re:code cracked, communication revealed (Score:5, Funny)
Next headline - F-Secure in violation of DRM (Score:5, Funny)
Hard to admit, but that is quite clever (Score:5, Insightful)
Re:Hard to admit, but that is quite clever (Score:5, Insightful)
Money?
Acclaim (within a small community)?
Politics?
I would guess money. Spam pays very well, and a lot of viruses and worms have had monetary ulterior motives, as always, follow the money.
Recognition (Score:3, Informative)
The only w
Re:Recognition (Score:2)
Re:Hard to admit, but that is quite clever (Score:3, Insightful)
Re:Hard to admit, but that is quite clever (Score:5, Interesting)
The feeling of power for this individual must be enormous... not saying its right, but you were asking why people write these things, and the feeling of power is something I believe is a big reason.
Then ofcourse we have the fact that a lot of these threats steal information etc, so as you say, money would be another reason...
Re:Hard to admit, but that is quite clever (Score:2)
It is quite true though that the talent these days seems to be going to those who like to do something malicious with their talent. It saddens me to no end, but I do believe this is a common road that those with actual talent and insight seem to be wanting to follow these days; it's a trend.
But, alas, I digress. M
Re:Hard to admit, but that is quite clever (Score:4, Interesting)
Re:Hard to admit, but that is quite clever (Score:3, Insightful)
Because it's perceived as more profitable than dealing with a manager?
Re:Hard to admit, but that is quite clever (Score:3, Insightful)
Re:Hard to admit, but that is quite clever (Score:2)
Re:Hard to admit, but that is quite clever (Score:2, Funny)
Not that I'm bitter or anything.
Many viruses come from very talented people... (Score:5, Insightful)
Re:Many viruses come from very talented people... (Score:2)
Re:Many viruses come from very talented people... (Score:3, Informative)
Re:Hard to admit, but that is quite clever (Score:3, Interesting)
Re:Hard to admit, but that is quite clever (Score:5, Funny)
Re:Hard to admit, but that is quite clever (Score:2, Flamebait)
Re:Hard to admit, but that is quite clever (Score:2)
I am rather suprized that you believe that the virus writers would even want to destroy their own enviroment. A clever virus would not destroy its own method of survival, that would be stupid. Instead, a clever virus will use as little resources as it can so it isn't caught because of performance hit.
Secondly, the
Re:Hard to admit, but that is quite clever (Score:4, Insightful)
In the larger scope, I'll just say that it's very tempting to think that one's computer programs just scale automatically, but this is simply not the case. Chances are that you were working on a very homogeneous network at that point, which most machines running rollout-synchronized versions of the same software. I've written "worms" that work under such an environment myself -- unlocking the parental protection on the middle-school computers made lunch-time in the library a lot more interesting. In such a situation, a worm either doesn't spread at all or immediately takes over the entire network, so any success is an impressive one.
On the real internet, on the other hand, we have a very complicated mesh of various systems with different sorts of protections, some explicitly designed as such but most just due to random variations that prevent a given buffer overflow from working on more than one system. Even if someone is running a vulnerable system somewhere out there, there's a good chance that getting at it may involve going past some other system that is simply going to eat it alive. We're not talking just about computers, but also about routers, switches, and all that Cisco equipment that's silently running a good deal of the net without anyone ever thinking about it.
That's why there hasn't been a real worm on the internet in quite a while; essentially every major virus in recent memory has relied on social-engineering to trick the user into manually installing the virus onto his own computer. In fact, I'd seriously doubt that it's even feasible to create a self-distributing worm on the internet at this point, unless Microsoft is dumb enough to build remote-execution capability into their application software again.
Of course, if you were actually working on a diverse, real-world type network, and you managed to devise cross-platform vectors, that's quite different and it'd be interesting to hear about. But if you're like the majority of people who make claims like these, I'm gonna have to say that your eyes are probably a little bigger than your mouth on this one.
Re:Hard to admit, but that is quite clever (Score:2)
Re:Hard to admit, but that is quite clever (Score:2, Troll)
Re:Hard to admit, but that is quite clever (Score:3, Interesting)
WTF?!?: "Complexability, I sniff the smell of it when my face is pushed in that kind."
WTF?!?: "I just wrote a trojan horse back in the mid-90s in a very simple script-language called pilot."
So you just wrote it? Or you wrote it in the mid-90's.
WTF?!?: "And that one worked so good as a proof-of-concept, that the sysadmin (a friend of mine) banned me for a month."
Earlier you said that people can't attack y
Re:Hard to admit, but that is quite clever (Score:3, Funny)
Our Father, who Pwnz heaven 0f da 1337z , j00 r0ck!
May all 0ur base someday be belong to you!
May j00 0wn earth just like j00 0wn heaven.
Give us this day our warez, mp3z, and pr0n through a phat pipe.
And cut us some slack when we act like n00b lamerz, just as we teach n00bz when they act lame on us.
Please don't give us root access on some poor d00d'z box when we're too pissed off to think about what's right and wrong, and if you could keep the fbi
Re:Hard to admit, but that is quite clever (Score:3, Insightful)
So if not, please stop that. I do my best to be understandable, if you dont like to read my commentary then skip it. Gna. That shit makes me angry. I never ever criticised anyone who talks german with a foreign accent. I never tried to bawl somebody out because he was not a native speaker. This is really bull
I want to make a difference .... because I can (Score:2)
Some people do constructive things for that, others do very destructive things.
It's the rush of having made a difference [dotgnu.info] in this world that drives both categories of people. Some sadly seem to like hiding and laughing, some others prefer to do creative things.
Once you're into adult hood, being a puppet master online starts to lose it's charm and you want more bragging rights - which is one
Re:I want to make a difference .... because I can (Score:2)
So the Sober worm author's destiny is to become a mild mannered hard working citizen in the IT work place. Who'd have thunk it.
Re:Hard to admit, but that is quite clever (Score:4, Insightful)
The ability to control several hundred thousand zombie computers.. are you kidding?
money, man, money.
You can do lots of things with that, but the most lucritive might be to blackmail gambling sites. If they don't pay, you DOS their IP block.
Re:Hard to admit, but that is quite clever (Score:4, Funny)
Sex. It's all about the groupies, man!
Re:Hard to admit, but that is quite clever (Score:2)
What should happen (Score:5, Interesting)
- Greg
The alternative (Score:3, Interesting)
Publicize the information so that other people can also figure out the algorithm. Don't give it away, just let out of enough so that a dedicated person can reach the same conclusion. Now just wait and nab every single bastard dumb enough to try
Re:The alternative (Score:2, Interesting)
Re:The alternative (Score:3, Insightful)
It's unlikely that the URL would be any "easily found" string of characters. I would suspect it's probably alphabet soup with a TLD suffix, but you would be able to catch "likely looking" Sober URLs.
.
Now what you want is for domain registration companies to watch out for said "likely looking" URL and flag it up as suspicious somehow.
BZZZZT!!! Talking out of you a** ... (Score:4, Informative)
http://people.freenet.de/ [freenet.de]
http://scifi.pages.at/ [pages.at]
http://home.pages.at/ [pages.at]
http://free.pages.at/ [pages.at]
http://home.arcor.de/ [arcor.de]
not really "alphabet soup with a TLD suffix", uh?
Re:BZZZZT!!! Talking out of you a** ... (Score:2)
Re:The alternative (Score:2)
They cracked it in May! (Score:5, Informative)
As it clearly says in F-Secure's blog, they cracked this in May. They're only going public now. They've informed both the ISPs affected and the police. It is very unlikely that anyone will be able to register those accounts - if they do, they'll probably be talking to the police.
Virus writer is a Free Software fanatic (Score:5, Funny)
http://en.wikipedia.org/wiki/January_5 [wikipedia.org]
Re:Virus writer is a Free Software fanatic (Score:3, Funny)
Richard Stallman is the only Free software fanatic.
Re:Virus writer is a Free Software fanatic (Score:2)
Relevant quote from above link:
"However, the capitalists, many of whom had up to then held Hitler at arms length, took fright at the upsurge in votes for the workers' parties. Consequently, on January 5 1933, Hitler was invited to address a meeting of industrialists and bankers organised by vice-president Baron von Papen, at the home of the aforementioned Baron von Schroeder. At the meeting, Hitler promised to bring an end to democracy in G
Re:Virus writer is a Free Software fanatic (Score:2, Informative)
Or maybe the writer intends to make bigger news than when "Warner Brothers [showed] the first color newsreel" (1948)
Or maybe it's the writers birthday.
Or maybe it's the first day they intend to be awake after the New Year celebrations
Or maybe it's to bring down IT infastructure just as we're getting back to work just after the Holiday Celebrations end.
The possibilites are endless, and there are far more logical expl
Re:Virus writer is a Free Software fanatic (Score:3, Informative)
If you think, that is about free software, then you haven't got bunch of text emails about dresden bombings and other propaganda.
Patent (Score:5, Funny)
He's missing some requirements... (Score:2, Interesting)
Re:Patent (Score:2)
using this algorithm without his permission is illegal and also capturing him after using this algorithm in the illegal way is not legal and he must be released from custody
and since you can't be charged for 1 crime twice, he will be off the hook
Re:Patent (Score:3, Funny)
Disinfection (Score:2, Interesting)
If that's true, what's to stop say symantec predicting a domain for a particular date, taking the domain, and putting a disinfection program up.
Re:Disinfection (Score:5, Insightful)
Re:Disinfection (Score:2)
Re:Disinfection (Score:2)
Unless they fuck it up. Sorry no, Symantec can run code on my PC once they pry it from my warm moist hands.
Re:Disinfection (Score:2)
Re:Disinfection (Score:2, Interesting)
http://people.freenet.de/
http://scifi.pages.at/
http://home.pages.at/
http://free.pages.at/
http://home.arcor.de/
I do wish they hadn't publicized it... might have scared off the guy or convinced him to really hide identity when registering.
Also some risk that sites around the world might indiscriminately block traffic to/from these sites, rather than specific URLs there. :(
Though, I guess, your point regarding disinfectio
Re:Disinfection (Score:2)
The domains do, but not the URLs. These look like free hosts, anyone can register and put up a simple page without having to supply any ID.
RTFA (Score:5, Informative)
Re:RTFA (Score:2, Interesting)
Calculate the exact URLs (Score:5, Interesting)
Re:Calculate the exact URLs (Score:3, Interesting)
Re:Calculate the exact URLs (Score:5, Informative)
So they would have to get in contact with the providers of those services instead (arcor.de, pages.at)
Simple (Score:2, Redundant)
Applications? (Score:5, Insightful)
I.e. we register one of the websites that Sober checks, and put a Sober removal tool on it. Come that day, Sober would download the file and delete itself without any user interaction.
Problem solved.
Re:Applications? (Score:5, Funny)
Better yet, have it install Ubuntu and solve the longer term problem, too. :-)
To expand... (Score:5, Insightful)
1.) Assuming the author(s) is(are) paying attention to happenings on the internet, he would be an idiot to actually try to put anything on those domains for that date (assuming there isn't anything there yet). If he does, I would guess that he would be as good as caught...well...maybe...I guess it depends on how well he covers his tracks when uploading his intended payload.
2.) Both of the linked articles urge SysAdmins to block the URLs they have listed, but I HIGHLY doubt that most of the infected home users will do so, or even know how to, so that will leave a lot of machines trying to connect. Can the URLs be blocked at the ISP level?
3.) Going with the parent post's idea, might it not be a good idea for the authorities to set up those URLs now, and put removal tools on them (assuming they can be automated and it can happen in the background)? It seems to me that any machines still infected when that date hits would be automatically cleaned and the problem would be solved on the first day...
4.) Or, if it is even possible, have the ISPs monitor for requests to those URLs (while blocking them), and if they receive requests for those URLs on that date, automatically send an email to the account holders of the IPs that are trying to access the URLs informing them that their machines are infected with Sober and provide instructions (and software) on how to remove it? Of course, this requires cooperation from a LOT of ISPs, but it doesn't seem completely impossible. Of course, this idea also depends on the users to take action to clean their systems and we all know how well personal responsibility is doing these days...
5.) However, perhaps the ISPs can monitor requests for the URLs that Sober will request, and then perhaps start disconnecting users who don't clean their systems after being warned.
Anyway, just some thoughts...but I see no reason for the net to be rid of Sober after the first day (or first month going by 4 and 5 above) of activation...
Of course, I don't know a lot of details about how these things could be implemented, so take it with a grain of salt...
roflcopter (Score:4, Funny)
+5 informative
Well known URLs (Score:5, Funny)
It posts trollish looking messages and chats to you in IM.
Personally, I usually just chill while connected with ethereal running, then connect back to the PCs backdoored by the viruses that are trying to infect my honeypot on tcp/135. Then a simple netstat will show you an established tcp connection back to the IRC server the virus is using to announce itself to the author (not to mention about 500 connections SYN-SENT or ESTABLISHED to PCs being infected/probed, also a good source for other infected, backdoored PCs. You do know what is attacking you and what tcp backdoor it runs, right?) You can usually spot that connection, it has a high TCP destination port, whereas the normal vector port is 135/137/139. It's really sad to see thousands of PCs aleady announcing themselves to the author on that IRC channel as, "Hey come on over, I am running W2k|2XP. I am XP200453." And there is no one there to give me +OP privs!!! Batrastards!!! I could echo 'you are hacked please visit windowsupdate.com'> the startup folder all I want for days to each one of them to no avail... or echo ''you are a moron, too stupid to own a computer, put it back in the box and yadayadayada....
I wonder what I would do with a beowulf cluster of networks of hacked (i.e. unpatched windows) PCs. probably echo the same message in the same fashion as above, yet, alas, I am seriously lacking in motivation and spare time. (q.q.v 4. Pr0F1T!!!)
so little time, so many IP addresses, so many ignorant users.... so many clever, clever coders...
Re:Well known URLs (Score:2)
Make all the phones in the world ring at once?
Re:Well known URLs (Score:4, Insightful)
I really do the echo something > notice.txt into startup folder, hoping the person will take action and realize they are infected... who knows what good that does. I am also a staunch privacy advocate, so nothing malicious (flame-suit on) from my end. mostly dir c:\windows\system32 |find "" to look for recently installed malware. I could care less about your files. That was how I found the log file that had what looked like a complete connection log to the IRC server. Too bad there are not more good commands in windows command shells (usually a virus opens a socket to cmd.exe) or I would kill and clean up and reboot, or even ftp down the patch, not like MS supports that though. (God the good old days of pre-retirement) This happens in internet time, not human time. If someone was really malicious, there is really no way even hundreds of humans could stop it. I take that back, a good hacker (in the MIT sense...) could reconnect back to the machine and issue some commands to shutdown the proc and stop the scanning, but again you are limited to what is at the ms-dos command shell, and we all know how well the anti-blaster worm worked with it's ICMP DOS. But given that a goofball scriptkiddie could connect like I did, maybe that is a good thing (good luck kiddies). Careful what you wish for and all that.
Disclaimer: Really, if I was black hat, would I post with my own account? (laughs hysterically as g-san gets investigated by the FBI the next day). Anyways come get me, I would love to work for you FBI and you could use my help.
Here goes... submit...
What's meant by "authorities"? (Score:3, Interesting)
Re:What's meant by "authorities"? (Score:2)
I see no harm in the police going to the relevant ISP and asking them either not to register the username 'dfgdfbvbb', or to provide them information on the registrant. If the ISP wants a warrant for the latter, that's fine too.
Now work backwards? (Score:4, Insightful)
Hmm... If they can predict forward in time what sites Sober will seek, can not they also look backward in time to see what sites the worm sought in the past ? If so, could they not then check the registration records for each of those sites and... find the author?
Re:Now work backwards? (Score:4, Funny)
Re:Now work backwards? (Score:2)
Nope. But, it might provide a trail to try to follow, no?
Sophistication (Score:5, Interesting)
I have often wondered why we haven't seen the emergence of worms with truly spectacular levels of sophistication. Nearly every worm / virus is small presumably so that it can spread quickly in limited bandwidth situations. The limited size means limited sophistication and sometimes flaws in the design or operation.
To the best of my knowledge no one has developed a worm with fully pluggable attack verctors and pay loads and automatic updating. An attack from such a worm would be all but unstoppable because there would always be a huge user base from which to start an attack. The attack would go like this:
Perhaps someone is already doing this, I don't know. It seems like a natural evolution for viruses though. A sort of virus P2P system so that the virus network can respond to attacks. You could even build viruses that knew the network was under attack and hid or destroyed themselves.
BTW I'm not a virus writter.
At least Viruses dont spontaneously mutate (Score:2)
viruses self-mutate and evolve. Laugh if you want...it will come one of these
days.
Re:At least Viruses dont spontaneously mutate (Score:4, Insightful)
That statment is naive. Biological organisms also have very strict rules that they need to conform, even stricter than computer programs. That is why most mutations are lethal.
Biological virus don't have anything like junk-DNA to mutate into something usefull. This happens because bilogical virus are also constrained into a small size, just like the computer's ones.
The biological virus can spread while mutating because each virus creates milions of descendents with hundreds of different mutations. Just out of luck, some are can spread well. We can do this with computer virus too.
Re:Sophistication (Score:2)
Re:Sophistication (Score:2)
May the V2V network use some form of anonymizing network technology then - it's slow but what would the virus author care. Digitally sign the updates, as well, so the virus only accepts updates from the real author. The technology is there and just waiting to be exploited.
Re:Sophistication (Score:2)
Re:Sophistication (Score:2)
Yeah, kind of lucky the world works that way for the most part. Touble is it only takes one person to let the cat out of the bag. The virus design in my initial post would be easy enough to stop on individual machines but, like type 1 herpes simplex (the virus that causes cold sores in humans), there would always be an unreachable portion of machines that can't be disinfected so the virus can re-emerge from these (the herpes virus lies dormant in the nerves where there is no immune response). It's an intere
This is a new one... (Score:4, Insightful)
It would have been better not to release this information. Now the author knows the game is up. Unless they have already traced him from some of the previous URLs, which I doubt.
So why release it then? The AV company just couldn't resist jumping up and down and showing everybody how clever they are. AV is more about marketing than technology anyway.
The thing is, I bet this algorithm wasn't even that hard to reverse engineer. I mean, I'm not saying that I could have done it and I'm sure most of you couldn't either. But to someone skilled in the black arts of disassembly and debuggery (if that isn't a word it should be), it would probably have been fairly trivial. At the end of the day, Virus authors usually aren't that bright. You can obfuscate and encrypt your code as much as you want but at some point it still has to executed. Most of the techniques are well known and I doubt this idiot invented any new ones.
Re:This is a new one... (Score:4, Informative)
So we cracked the algorithm. This enabled us to calculate the download URLs for any future date. In fact, we did this already in May 2005, and we informed the local police in Germany as well as the affected ISPs. But we didn't want to talk about it publically then - we didn't want to fill in the virus writer on this. But he must know this by now.
Something to think about.
Re:This is a new one... (Score:3, Insightful)
No, it isn't. Not about either of those. It's about hard work. AV means having honeynets to catch the malware, then take it apart, create a signature, plug that into your file and send out an update. All as quickly as possible, pretty much around the clock.
uh.. (Score:2, Insightful)
Why did they have to crypto'ally crack the code? (Score:3, Interesting)
Re:Why did they have to crypto'ally crack the code (Score:3, Informative)
Yeah you could spoof the response from the timesever, but simply cracking the code is far more elegant.
Reminds me of a song..... (Score:3, Funny)
(Note: I apologize to anyone who is aware of the origins of the song I'm parodying.)
Clean and Sober (Score:3, Interesting)
Re:My Question... (Score:2)
Re:My Question... (Score:2)
Either way, the public is a mushroom farm until they haul the toadstool into court.
Re:My Question... (Score:3, Insightful)
Mod the parent down (Score:4, Informative)
Or read my previous comment [slashdot.org].
F-Secure didn't simply crack the algorithm yesterday.
Re:My Question... (Score:5, Insightful)
Yeah, because when I get a mysterious popup telling me my computer may be infected I always click "Next."
Re:My Question... (Score:2)
PS: When can we expect the Drunk worm?
Re:My Question... (Score:2)
Re:My Question... (Score:2)
Clicking "Next" at a random popup is a bad habit to encourage. Not to mention they may think they are ads.
Re:uhh... (Score:3, Interesting)
Close.
The actual prudent thing to do would be to use said algorithm and see what domain is generated on the 5th of January 2006, before the date even arrives. Alert ICANN registrars of the situation. Monitor that domain name, and watch for the second it gets assigned an IP. When the particular domain begins to point to a global IP address, then you can nab the perp.
As a bonus, in the above scenario, you dont have to wait for all the compromised machines to bog down yet another unsuspecting network on the
Re:uhh... (Score:3, Informative)
So all you'd need to do is register the account name on the free hosting service that's utilized for that day and away you go. Not a problem to register an account using a hacked email account and keep it anonymous.
N.