Botnet Herders Attack MS06-040 Worm Hole 112
Laljeetji writes "eweek reports that the first wave of malicious attacks against the MS06-040 vulnerability is underway, using malware that hijacks unpatched Windows machines for use in IRC-controlled botnets. The attacks, which started late Aug. 12, use a variant of a backdoor Trojan that installs itself on a system, modifies security settings, connects to a remote IRC (Internet Relay Chat) server and starts listening for commands from a remote hacker. On the MSRC blog, Microsoft is calling it a very small, targeted attack that does not (yet?) have an auto-spreading mechanism. LURHQ has a detailed analysis of the backdoor."
IRC the weakpoint? (Score:2, Insightful)
I would like to see these virus authors caught and publicly executed for once.
Re:IRC the weakpoint? (Score:5, Informative)
actually, they say its the same server thats been running for months:
Amazingly, this new variant of Mocbot, still uses the same IRC server hostnames as a command-and-control mechanism after all these months. This may be partially due to the low-profile it has held, but also may be due to the fact that the hostnames and ip addresses associated with the command-and-control servers are almost all located in China. Historically Chinese ISPs and government entities have been less-than-cooperative in taking action against malware hosted and controlled from within their networks.
Is it a stretch..... (Score:3, Interesting)
Re:More Red COMMIE BASTARDS at their usual asshole (Score:2, Interesting)
Stop being such an ignorant twat. The US also turns a blind eye to crimes far worse if they a bit of an embarrasment overseas.
The US also point blank refuses to allow their soldiers to be subject to any laws except thier own when they are serving overseas. So why should any other nations hand criminals over to the US if they wont do the same in return.
Re:IRC the weakpoint? (Score:3, Funny)
Re:IRC the weakpoint? (Score:2)
Internet the weakpoint? (Score:5, Insightful)
Suppose the bots all used AIM or MSN Messenger servers. Would you demand that those be taken down?
The weak point is not IRC or any other communications method. The weak point is software that's so easy to exploit it has new "critical" patches every month [insert tampon jokes here].
Re:Internet the weakpoint? (Score:1)
It's a lot harder to exploit now. I guess the patch that came before the last one must have done something to the updater itself, because when these critical updates came out, my laptop nagged me like a four-year-old every five minutes about rebooting until I finally gave in.
I'm not really complaining. From now on, any new computer that Joe Average gets (or if he happens to update his current box) will make sure at least Windows is up to date. Now, if only Joe knew that AVs have to be updated...
Re:Internet the weakpoint? (Score:2)
You're kinda saying that strong encryption is responsible for its illegal usage by criminals, or that the "easily exploitable" p2p networks are responsible for IP infringment: but the technology has no responsibility, it's always a human being who actually *breaks
They weren't saying to take the IRC server down... (Score:1)
Re:They weren't saying to take the IRC server down (Score:2)
If true, that's hardly a problem unique to IRC. The root cause remains Windoze.
Re:They weren't saying to take the IRC server down (Score:1)
Re:IRC the weakpoint? (Score:5, Insightful)
Also, most bot herdes are in eastern europe, brazil, or developing countries. Catching hackers isn't high on the list of law enforcement priorities in the countries (and, if the right amount has been paid to the right people, it's completely ignored).
Re:IRC the weakpoint? (Score:1)
Re:IRC the weakpoint? (Score:2)
Re:IRC the weakpoint? (Score:5, Informative)
The reason for all this subterfuge is, if the AV companies aren't spying on the control channel, they have no way to know about the second-stage infection, unless they get lucky - so even if they do clean the Mocbot infection, the proxy trojan still resides on the machine.
Re:IRC the weakpoint? (Score:1)
Re:IRC the weakpoint? (Score:2)
Nothing. They are doing exactly that.
Modern botnets are organized more like terrorist cells than anything else. What they're doing is opening encrypted channels only between the infecting and infected machines, and run as a peer-to-peer network. It's very much run like a Tor network.
So now, there's no single IRC server. The botherder can connect to any infected machine and issue a command, and the command will propagate peer-to-peer. The communications
strange hadlines... (Score:3, Funny)
I really hope they reverse their shield polarity when attackign that wormhole, or it could trigger a tachyon cascade....
Re:strange hadlines... (Score:3, Informative)
Re:strange hadlines... (Score:1)
The sad thing (Score:1)
Whats gonna happen when Norton removes WGA? (Score:5, Funny)
This variant of mocbot copies itself to the system directory as wgareg.exe, and creates an NT service to run at startup called "Windows Genuine Advantage Registration Service". The description given to the service reads "Ensures that your copy of Microsoft Windows is genuine and registered. Stopping or disabling this service will result in system instability.", in an attempt to discourage users from stopping it from running.
Do we actually know which is the more malicious variant?
Re:Whats gonna happen when Norton removes WGA? (Score:1)
Re:Whats gonna happen when Norton removes WGA? (Score:2)
With that much malware, man, your system is FUBAR... time to reformat.
Re:Whats gonna happen when Norton removes WGA? (Score:3, Insightful)
Could be (Score:3, Funny)
If you're running norton you've got bigger problems than this worm.
Is that true? I don't have any of these problems and would like to find out. Is there a Debian version of this Norton? What kinds of problems can I expect if I install it?
Re:Could be (Score:1, Offtopic)
I guess some things just don't change.
Cha-ching, another fan. (Score:1, Offtopic)
Just yesterday you were modded down to -1 for attempting the same "joke".
So, you read my posts before you mod them? Great. Would you like to subscribe to my newsletter, Buggy?
Re:Cha-ching, another fan. (Score:1, Offtopic)
No, I don't mod. I just happened to be reding through the story comments and unfortunately I noticed yours. It's always a pain to read what you write.
Would you like to subscribe to my newsletter
OMFG, ROFL and all that. Always the comedian, good old twitter.
Re:Could be (Score:1)
Update Server 2003 and XP SP2 as well (Score:4, Informative)
A Solution... (Score:5, Insightful)
As wonderful as it would be if all software was completely bug free and contained no security holes, it's simply impossible. No product, be it OSS or commercial, is free of these banes. On the other hand, problems like this would nearly go away, if only users would patch the software. Whether it's a new exploit in Windows or Apache or phpBB, if you don't patch, you're going to get screwed. Yes, it seems like Microsoft products have more patches than average, but at least they have patches. Blaster and MyDoom? They'd have never hit the news if users were patched. Automatic Updates in XP is a great step forward, but it's still opt-in.
Some people seem amazed when I say I had no direct problems with Blaster or Welchia, and they don't seem to get it that these problems essentially always appear after a patch is release which means there is no valid reason for their survival. Patch, patch, patch, patch, patch. Yes, slightly monotonous, but if users would simple do it, we'd stop seeing these equally monotonous news stories about Exploits of Doom.
Re:A Solution... (Score:5, Insightful)
Re:A Solution... (Score:2, Insightful)
Re:A Solution... (Score:1)
Re:A Solution... (Score:2, Funny)
The testing process. (Score:4, Insightful)
So there will be a delay between a patch being released and that patch being deployed on production systems.
And going into "crisis mode" for 2 weeks, starting the second Tuesday of every month is a bit much to expect of people.
Re:The testing process. (Score:1)
Re:A Solution... (Score:5, Insightful)
Corporations have trouble because they may well have thousands of configurations they need to support, so even if 1% of them fail, it's a major problem. Still, imagine if Microsoft forces a patch out, and they cause the machines that have Quicken version 6.3532 build 4 to completely destroy all financial records on their next startup. (Or even just render them unreadable, since we're assuming non-technical users.) Imagine the liability issues, which, frankly, probably terrify the executives at Microsoft already when they issue a patch. Forcing the patches on users makes those issues even worse.
The worst part is, none of what I've said here contradicts anything you've said. It's all in play at once? So, which side dominates, and under what circumstances? I really couldn't tell you. However, I would think the empirical evidence at the moment is in your favor. But is the only/best solution really to cede control over your computer to Microsoft (which are the people who got you into this situation in the first place)?
At least Open Source doesn't have that issue; since nobody is in charge and nobody is making money by controlling your computer (DRM, etc), the conflict of interest involved in creating a security situation where what seems to be the best solution is deeding your computer over to the same people doesn't come into play.
Re:A Solution... (Score:2)
I agreee that some people are too stupid to be allowed to breed or own a computer, that does not not mean that they should be forcibly castrated or neutered, nor shoukd they should MS force them to install softwar
Re:A Solution... (Score:2)
Re:A Solution... (Score:2)
Same goes for WGA. WGA Updates aren't even synced with WSUS (small-to-medium Business Patch Deployment Solution, Free), or SMS (medium-to-big Software Deployment / Patch Managment Solution, Costs money).
So all this stuff isn't interesting for corporate users, because it doesn't concern them.
Re:A Solution... (Score:5, Interesting)
Patches are one thing but if people just used a firewall (even the built in one in Windows XP) or even just turned off the Server service (most home users don't need it) most of these worms would not have anywhere to go.
I'm amazed at the number of PCs that are are still blindly connected to the Internet with no firewall. Crank up NMap and run it over your ISPs dyanmic address range and have a look.
Re:A Solution... (Score:1)
Re:A Solution... (Score:2, Insightful)
Correct me if I'm wrong, but isn't a patch software?
KFG
The problem with that assertion.. (Score:2, Insightful)
prime examples so far - bundling of windows genuine advantage with security patches and xbox 360 forced updates through live.
Re:The problem with that assertion.. (Score:3, Informative)
Re:A Solution... (Score:4, Interesting)
I had a couple clients (residential, not commercial, mind you) who had me correct the problem. One of these clients had ben prior customer... and I had stressed updating Windows on a regular basis. Let me tell you... that was a fun conversation. "Yes, an update to Windows broke your system. Yes, I do have to charge you for this service. Yes, I realize I told you a few months ago to make sure you updated Windows regularly. No, unfortunately I cannot fix this for free since Microsoft screwed up the patch."
Danged if you do, darned if you don't...
Re:A Solution... (Score:2)
Re:A Solution... (Score:1, Flamebait)
'supporting' windoze, besides making your work life a living hell, does not do anyone any good. Let them windows lusers get screwed to the point they will get sufficiently pissed of at microsoft to do something to rid themselves of that misery.
as long as there is a nerd-bitch to 'fix your windows box for some bucks', this crap will go on endlessly. I, for one, plainly refuse to do anything on any fam
Re:A Solution... (Score:2)
If you can answer how using Windows makes my work difficult or establish any criterion for what "good" for me is, then maybe it might be insightful. Could you explain who "he" is? Not to be pedantic or anything. I'm only asking because your attitude pisses me off.
Re:A Solution... (Score:1)
My attitude may piss
Re:A Solution... (Score:1)
However I doubt the company would sue the
Re:A Solution... (Score:3, Insightful)
Re:A Solution... (Score:2, Insightful)
Re:A Solution... (Score:1)
Re:A Solution... (Score:4, Insightful)
So when the next Blaster/Welchia-like worm hits, they haven't downloaded the patch 'cause they listened to me... and then I get to go back out and clean the virus off their system, and explain how they got the virus (worm, really, but I usually get that glazed-eye look when I explain the difference), and what they could've done to prevent it. Then I get to charge them, and explain why I'm charging them. See a pattern here?
End result: the client (end-user) is the one left hanging. If he blindly patches, he runs into problems. He blindly ignores the patches, he runs into problems. If we could only raise his level of computer literacy, he might actually have a chance to understand what the patch does, what might interfere with it, and possibly even solve the problem on his own if it occurs.
Seeing as that's very unlikely to occur, the system breaks down. Something's gotta give. Something's gotta change. Until it does, the end-user gets left hanging.
Re:A Solution... (Score:3, Informative)
Re:A Solution... (Score:2)
Re:A Solution... (Score:2)
Re:A Solution... (Score:2)
Preachin' to the choir there. We just started getting a new crop of students in our graduate college(so these are mostly people who spent at least the last 4 years as undergrads) and so far about 2 of the students were still on XP SP1 and the rest had about 3 reboots worth of updates to pull down on average. That's why we have classes where all we do is walk them through how to update Windows, anti-virus, and anti-spyware software. The number of
make them use free software. (Score:2)
Find a way to make the average user patch software. As wonderful as it would be if all software was completely bug free and contained no security holes, it's simply impossible.
It's very easy with Debian's stable distribution:
That's it, all done and it never breaks anything.
If it were that easy to upgrade commercial software, users would do it but it's not. Commercial software lacks both the resources to fix things and the ability to co o
Re:make them use free software. (Score:1)
It's even easier with Windows - it's called Automatic Update (SP1 or later) and it does it all itself and the only part you have to worry about is when it asks you to reboot, and you click Restart Now. Alternatively, you can follow these steps:
Re:make them use free software. (Score:2)
No, it takes a court of law to prove something like that. All I can do is point you to the DRDos and Netscape trails, where your government used M$ internal emails to prove sabotage and other nasty behavior. You will have trouble finding the DRDOS case because M$ and SCO had it shredded.
Re:make them use free software. (Score:2)
Oh, and the OP took his time to reply to your post point by point - it would be nice for your credibility if instead of just doing some selective quoting you could reply with
Re:make them use free software. (Score:4, Insightful)
We need a best of both worlds solution here. Windows Update is an excellent concept. But the execution sucks for the reasons you specified - EULA changes, WGA, poor/untested/damaging patches. It needs work. But in the long run, it'll be a lot more successful and helpful than any apt-get command, or anything else that's not entirely automatic beyond authorizing changes.
Re:A Solution... (Score:1)
Re:A Solution... (Score:1)
Re:A Solution... (Score:1)
If it's anything like it's on 2k, it's like having a funnel right through your mouth straight through to your stomach shoving stuff down and calling that opting-in to eat dinner.
Compartmentalization and openness (Score:1)
It's interesting to note that the Microsoft Security Bulletin [microsoft.com] does not disclose the component of the "Server Service" that is subject to the vulnerability. In particular, one cannot simply disable the relevant service. Actually, I don't even know whether their software is built to make such things possible. The reason I'm suspicious is because they recommend blocking certaing ports with a firewall rather than disabling the relevant component.
I'm completely unfamiliar with MS server software, but there
Re:Compartmentalization and openness (Score:1, Informative)
Re:Compartmentalization and openness (Score:2, Informative)
Wondering... (Score:5, Interesting)
Re:Wondering... (Score:5, Informative)
An alternative is to use DNS to redirect the bots to a blackhole IRC server where the remove command can be executed. Of course, this only works if you have control over the DNS (e.g. an ISP redirecting their own users). Getting someone responsible for the authoritative DNS server is not likely to happen given the Chinese origin.
If users need to patch.... (Score:2, Interesting)
As I understand it... (Score:3, Interesting)
It looks like the blog on technet calls the current attack "extremely small" and "extremely targeted" - to only those PCs running W2K, which as I understand it, is millions of bidniz PCs.
This is like calling 911 and having the dispatcher say "It can't be a very bad fire if it's only in the kitchen! Call us back when it gets to attic."
Re:As I understand it... (Score:4, Informative)
Actually it's a PC who is running Windows with open Microsoft Networking ports open while connected to the Internet. Big difference. There are many holes over the years that have been exposed with the NT LAN Manager networking stack that have led to these ports being blocked at the firewall as standard practice. Going back to 1997 from what I recall someone could open up an anonymous IPC$ pipe with an NT box and create their own admin account. Things have improved since then, but anyone who has these ports up and listening on the Internet is an idiot. Back in 2000 my company got its first DSL router for Internet acccess. Even that hardware came with an option just called "Microsoft Networking" blocks. Of course patch your boxes. Keep them updated. This would avoid some local host getting something propagated through your LAN/WAN. But as for the Internet aspect, God knows people should have learned. Ports 137, 138, 139, and 445 should be nowhere to be found from the Internet!
Re:As I understand it... (Score:1)
If you're going to use bad analogies, it's closer to, "Your house burned down because you were using 50 year old wiring that wasn't up to code. We inspected your house and even offered to update all of your wiring for free, and you declined. Now your house is on fire, and we can send out a fire truck, but there's really nothing more we can do as it'll be
Re:As I understand it... (Score:2)
You misunderstood my analogy... (Score:2)
Re:You misunderstood my analogy... (Score:1)
If you're going to claim I misunderstood your analogy, you should at least try to understand mine. I wasn't saying that Microsoft implements olde
Futurama (Score:1)
Re:Blocking outgoing IRC ports effective? (Score:1)
Yes. Although stupid botnet 'herders' may have their botnet ircds listening on the default port (6667), anyone who is even a half wit is smart enough to change that to something utterly random.
Besides, why block IRC - IRC is so fun :)
Re:Blocking outgoing IRC ports effective? (Score:2, Funny)
Besides, why block IRC - IRC is so fun
Indeed, which is why some of us irc admins open up port 8080 so anyone has a fair chance at losing their job.
Wormhole Video (Score:1)
Re:Wormhole Video (Score:1)
Worm Hole Not Protected? (Score:2)
We already use trade sanctions... (Score:2)