"Dasher" Worm Brings Christmas Keylogger 114
An anonymous reader writes "A worm called 'Dasher' is exploiting a flaw in Windows that Microsoft issued a patch for in October, dropping keyloggers on infected machines, according to F-Secure. The SANS Internet Storm Center warned earlier this week about the weird traffic generated by the first version of this worm, which apparently was crippled by programming errors. Washingtonpost.com has some information that indicates the worm appears to have originated in China. It appears from the Microsoft advisory that Dasher is a threat mainly to Windows 2000 users, although it could impact Windows Server 2003 and Windows XP users who aren't running SP2." Update: 12/17 17:20 GMT by Z : Fixed link to SANS center.
They do not need to bother (Score:4, Funny)
Impractical amount of data? (Score:4, Interesting)
Re:Impractical amount of data? (Score:1)
Re:Impractical amount of data? (Score:3, Interesting)
Re:Impractical amount of data? (Score:4, Interesting)
Re:Impractical amount of data? (Score:1)
It's immune to this keylogger.
Re:Impractical amount of data? (Score:1)
Re: (Score:3, Insightful)
Re:Impractical amount of data? (Score:1)
Say I'm a hacker, right? And I notice a bug in some open-source code and I notice a bug in MS' new version of IE.
Now I'm a good person, but I don't have access to the IE code. So I can fix the open-source code, but all I can do about IE (or any other MS product) is tell them and hope they'll fix it but many don't since MS doesn't see them as a problem.
The only way to get them to fix it would be to prove to them that it IS a problem.
Sure, there's a lot of bad people who want to
Re: (Score:2)
Re:Impractical amount of data? (Score:1)
And if they ignore the POC?
"The Mozilla dev team has done it multiple times since the release of Firefox 1.0."
Has the Mozilla dev team ever rejected any fixes to code? That's what really matters. Now that they're in the spotlight and are under pressure to be better than IE, it's perfectly normal for them to prioritize things. However, I'm sure they haven't rejected anyone's working code fixe
Re: (Score:2)
Re:Impractical amount of data? (Score:1)
Re: (Score:2)
Re:Impractical amount of data? (Score:1)
If you ask me, it's not. I paid good money for both Win98 and Win98 SE, both of which claimed to be made with the Internet in mind and claimed to be secure. If they had the Internet in mind and made it secure, why did they make it with so many Internet security holes?
Linux never claimed anything to me exce
Re: (Score:2)
Re:Impractical amount of data? (Score:1)
While it is too bad that Unix had "Morris", let's not forget that the Internet was still not a very common thing back then and was a much different place than it is today (reminds me of Dave Chappelle's "What if the Internet was a Place" skit :) ). Before the
Re: (Score:2)
Re:Impractical amount of data? (Score:1)
Re:Impractical amount of data? (Score:4, Informative)
Mmmm... I can only really agree with you on the 100% point concerning this particular keylogger.
For the rest.... I think it would be pretty easy for me to write a little useful app, which also happens to log all your keystrokes and just release it, maybe package it as a
The people that do find out will of course spread the word very quickly in their circles, but the people that do not find out are not likely to be in those circles - newbies in particular, running Ubuntu or Suse and not very sure about how all this linux thing works will be a good target. I think on the whole, it would go undetected and unfixed pretty much on a same timescale as a Windows worm. Damages will be limited due to a lesser distribution and not running as root, but they will be there.
The last point you mention, linux getting better as more people use it, I find very hard to believe at all. I see what you mean - linux will get better as more developers, i.e. serious professional programmers who know what they're doing, join but not as more people just use it. I'm pretty willing to bet, that of 10 new linux users, 1 will try to improve it, 3 will have an in-depth interest, unafraid to recompile their kernel or to try things out, but the rest will be your Joe Average, finally convinced by his geek friend that he should use it instead of Windows. He will not change his default configuration that came with his user-friendly distro, he will certainly not know of, or touch any configuration file, and if you say that you have an application which automagically crawls the net for Anna Kurnikova pics, he will download and install it The more people switch to linux, the higher the number of absolutely clueless people will be. This won't make linux worse or better, but it will increase the number of targets for malicious people.
So, in summary, I do think it would be relatively easy to install a keylogger on other people's machines and the more people use linux, the easier it will become to achieve a significant spread.
Re:Impractical amount of data? (Score:1, Insightful)
Re: (Score:2)
Re:Impractical amount of data? (Score:1)
You're right, but any program that is run by a non-privileged user (without running su or sudo) can only affect the files and folders that can be modified by that user. Running a virus program as an unprivileged user will only infect that user's files - just delete the user's files, delete the account, create a new account, copy a backup of the user's files, and you
Re: (Score:2)
Re:Impractical amount of data? (Score:1)
No, I'm pretty sure they were exploited in 2000 or 2001. I don't remember exactly when, but it was around when I decided to switch.
" Outlook won't even render regular html email by default."
I bet that looks pretty.
Are you serious? There's a security problem with OE. . . so they disable HTML rendering? Simply not making OE able to handle scripts would've done
Re:Impractical amount of data? (Score:1)
No, you can't "do a lot of damage". How do people find out about a Linux app? They hear about it from the Linux sites where the Linux nerds tear them apart and look at their code to analyze it and learn from it. Sure, some misfortunate user might stumble across your code, but it's not likely that they'll ever hear about it unless you trick them into running it - and even then, they might not know how to run/in
Re:Impractical amount of data? (Score:2)
Re:Impractical amount of data? (Score:1)
Re:Impractical amount of data? (Score:1)
Re: (Score:2)
Re:Impractical amount of data? (Score:1)
Re:Impractical amount of data? (Score:3, Insightful)
I think it would be trivial to write a script to go through the data looking for email addresses & credit card / bank account details.
I'm sure thats what the author is after....
Re:Impractical amount of data? (Score:1)
Re:Impractical amount of data? (Score:2)
Easily filtered (Score:5, Informative)
This won't get you into systems with multi-factor identification (like a Secure ID-based password), but it can get you the financial and personal data for government workers who might be subvertible as spies through blackmail, extorsion, or just through a simple offer to help them through a financially difficult time. (This is one reason why your credit history is an important part of getting security clearance.)
Of course, if you're just looking for financial data to rob people indiscriminately instead of something far more sinister, you can look for sections of text starting with people entering URLs for banks and so on. It's not that hard to write scripts to troll through this sort of data using simple shell scripting or Perl. As someone who works at a telecom company, let me just say that grep'ing through gigs of text data for particular strings (like a phone number in a transaction record) only takes a matter of a few minutes. It's something for which you open up Slashdot to read a single article and then come back.
No, sifting through this kind of data wouldn't be a technical or resource challenge in the slightest. Receiving and storing it would be the hardest part of the whole operation after actually writing the code to take advantage of the exploit. Extracting data from text files is monkey work.
Re:Easily filtered (Score:2)
Re:Easily filtered (Score:2)
Re:Easily filtered (Score:2)
Most text editors will load the full file into memeory, and then load it into an editing window. So you need at least as much memory as file size. You need even more if you're loading something like XML.
Re:Easily filtered (Score:2)
Many people may have the impression that keyloggers record everything a victim types on their keyboard. While a few keyloggers in use do that (usually the commercial variety designed to help parents spy on their kids' home computer use), the bad guys generally aren't interested in reading reams of IM chat conversations and silly e-mails. Plus, that's a huge amo
Well it is a keylogger (Score:2)
Even if you have the most primitive and complete of keyloggers you can roughly say this about how a login/password pair should appear. A string of characters, usua
It could always be worse... (Score:3, Insightful)
This could be a major problem if it infected SP2 computers.
Re:It could always be worse... (Score:2)
Re:It could always be worse... (Score:2)
Re:Could be worse...Is worse than u think... (Score:4, Interesting)
While this still could be worse, you are correct on one thing: Win2k in schools.
Spent the summer working at a local university. There was superfluous opportunity to embezzle a lot of money; as we were instituting their absolutely awful new HR software--which also meant I got to see how much all the bigwigs and upper-administrators (read: idiots puffed full of their own self importance) made off of hard-working students. (I was brought on as a Data Technician; not support or PC repair or what-have-you)
When the machines in our semi-secret office (All W2K) were infected with a virus (Don't ask me, I no longer remember, but I went & read the writeup @ symanted then, which told me it was able to cross-propogate through the network once it landed on one machine) I of course decided to quarantine the bastard myself first... I then realized what I had most feared--that these machines were all set up to Track who was using them; but not to actually restrict Anyone from Anything. Thats right, Joe Schmoe user could do anything he wanted; from registry-hacking to whatever your heart desired.
So; I managed to isolate this guy and the three other viruses that were wandering through the War-Room (thats what we called it); but I didn't purge, at this point I was too intrigued, so I summoned the IT guys.
4 hours later ONE guy (who looks like a plumber, and not even Mario) shows up, and begins, well, piddling (there's no other word for it.... he threw in an admin password and started checking completely unnecessary settings, then attempting to read the reports that their Tracking software creates, presumably to get to the root of the problem) with the machines after pretending he doesn't need me to tell him what I've done so far. His expression gets more and more bored, and after about another hour and a half, he tells my boss (one of them aforementioned admin-types) that he can't find anything wrong, and she should watch 'that new guy'.
I'm pretty sure they heard my jaw hit the floor on the other side of campus. A week later I had recieved the job offer I'd been counting on from the local cable service provider; and I headed for the hills, washing my hands of the whole situation, and terribly glad the only records tying my name to the lpace were strictly paper-based.
I checked in on it with a friend of mine who's a student there. He moved here from China, and is still a little unpolished with his english, but I heard this loud and clear: "Oh my FUCKING GOD man! Half the computers on campus are FUCKED!"
I can only assume that Mr. Plumber did not get anyone to look into the virus.
I have no idea how much that mistake cost the University; but I do know that once it was cleaned out, nothing changed. They are merrily running the exact same sytems setup the exact same way; probably every one of em mapped off the mirror sitting in the IT department.
So yes, I do believe that this could have MUCH wider-effect than you believe.
Re:Could be worse...Is worse than u think... (Score:1)
Not quite... (Score:2, Informative)
Re:It could always be worse... (Score:1, Flamebait)
zaku@sage # fdisk /dev/hdb
The number of cylinders for this disk is set to 6232.
There is nothing wrong with that, but this is larger than 1024,
and could in certain setups cause problems with:
1) software that runs at boot time (e.g., old versions of LILO)
2) booting and partitioning software from other OSs
(e.g., DOS FDISK, OS/2 FDISK)
Command (m for help):
Command (m for help): d hdb2
Partition number (
Convenient? (Score:5, Interesting)
The next day an article comes out saying that only SP2 will save you!
Re:Convenient? (Score:1)
Re:Convenient? (Score:1)
Re:Convenient? (Score:2)
I think the worm originated in Fort Meade [mccullagh.org], the stories originated from the Pentagon. That or the Chinese are targeting each other, not us.
Watch out (Score:4, Funny)
but the advisory says... (Score:5, Informative)
From the advisory link:
Affected Software:
Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 - Download the update
...
Re:but the advisory says... (Score:2)
I am
"OMG Ur CrAzY!!1"
Well, I run a virus scan every now and then, I check my outgoing traffic for anything suspicious, etcetera etcetera etcetera. So calm down.
Re:but the advisory says... (Score:2)
Re:but the advisory says... (Score:2)
Re:but the advisory says... (Score:1)
Oh What Fun (Score:3, Funny)
Re:Oh What Fun (Score:1)
My answer to Key loggers (Score:5, Funny)
Keylog THAT if you dare
Re:My answer to Key loggers (Score:2)
Re:My answer to Key loggers (Score:2, Insightful)
Unfortunately the datastream produced by vi is very easy to examine - just pipe it into another copy of vi, and there you go. Easier
Re:My answer to Key loggers (Score:2)
Re:My answer to Key loggers (Score:2)
Ha! I got it! I have the logfile for the Perl code session! It's...no, wait...no, sorry, it's just line noise from my bad internet connection.
As I thought... (Score:2)
Programming errors (Score:1)
It just hit me (Score:5, Interesting)
And it just hit me that we'd never get any of this if we were not on-line all the time.. Few years ago when the first internet worms were appearing I was like "ahah, just don't stay connected all the time you idiots".
Now I and the majority of folks around the world are "converted" and hopelessly tied to on-line, making us vulnerable to those attacks.
How many minutes can you spend offline, before the reflex kicks in and you try to google up some info you need?
Re:It just hit me (Score:1)
On another topic, FF just blocked a popup from here. I'm not on my normal computer so I guess it could be adware, but popups on Slashdot? Hmm...
That's not the answer (Score:2)
A) Have virtually no use to most users (I guess some software uses MSDE *puke*)
B) Should not be exposed on a public IP (a.k.a. you should be running a firewall)
A $55 firewall [newegg.com] would significantly impede the spread of worms
Re:It just hit me (Score:1)
What is this 'offline' of which you speak?
maybe it's santa! (Score:5, Funny)
sing along now... ..."
"He knows when you've been sleeping. He knows when you're awake. He knows what you're typing.
Re:maybe it's santa! (Score:1)
Bugs? (Score:2, Informative)
Worms with bugs?
Re:Bugs? (Score:1)
Re:Bugs? Ever heard of parasites on bugs? (Score:2)
http://www.google.com/search?q=worms+with+bugs&ie= UTF-8&oe=UTF-8 [google.com]
parasites on insects:
http://www.google.com/search?hl=en&lr=&ie=UTF-8&oe =UTF-8&q=parasites+on+insects&btnG=Search [google.com]
Brood Insects:
(pick your favorite hated OS maker...)
www.cals.ncsu.edu/course/ent425/tutorial/carnivore s.html
Now, what happened to Slapper? Is slapper "slappin' ass" somewhere?
We're really in trouble if "Gasher" arrives and actually gouges random chunks of memory or disks.
Funny tho that Da
Another Scam? (Score:2, Insightful)
Re:Another Scam? (Score:2)
From 2000 server to 2003 + current sp
Of course... (Score:2, Insightful)
Well I will tell you. They don't as Microsoft NEVER EVER release just a `fix' patch. It is bundled with other patches that break lots of things. So people either:
a) Can't as it fubars their system.
or
b) Too scared what it breaks. [I still get very nervy at work when applying these patches to servers - you never know - nor guarantee - if it will ever come back up again or just get BSOD.]
It is about time MS started to just issue a patch to fix ONE of their
Re:Of course... (Score:2)
Re:Of course... (Score:1)
OK... (Score:2, Interesting)
http://support.microsoft.com/kb/905915 [microsoft.com]
WTF?
Re:OK... (Score:2)
Patch bundling (Score:3, Interesting)
If MS was to bundle other (security) fixes in a patch, they would quickly be identified by reverse engineering the patch and used to exploit as-yet-unpatched systems. There are people who look over these patches in extreme detail, both "white hat" and "black hat" types.
If they bundled other fixes / changes, their business
Re:Patch bundling (Score:2)
I can't believe I'm compelled to say this...
Don't you mean total cost of 0wnership [bsdnexus.com]
Oh crap ... (Score:1)
Re:Of course... (Score:2)
Actually, if you install Windows XP Home/Professional SP2, the setup gives LOTS of warnings about having Automatic Updates active. I run Automatic Updates in Warning mode so as soon as the updates are available I can download and install the updates quickly.
What am I missing? (Score:2, Insightful)
Re:What am I missing? (Score:2)
Irony (Score:3, Interesting)
Re:Irony Irony-2 (Score:2)
Password Safe (Score:2)
Why not make keystroke loggers useless? I love this software. Just copy and paste passwords
Re:Password Safe (Score:1)
Why not make keystroke loggers useless? I love this software. Just copy and paste passwords
What? Do you really think it's difficult to modify a keylogger to capture the contents of the clipboard too?
It's been done before. And while I'm not a programmer, I'd be surpised if there wasn't a Win32 API for doing exactly that.
If your system is compromised by a worm then you have to assume that it is completely compromised. Have a look at the Metasploit vulnerability scanner
Reindeer games? (Score:1)
On, Comet! on, Cupid! on Dunder and Blixem!
great (Score:1)