Malware Pulls an "Italian Job" 133
A number of readers sent us word about a malware attack that has been underway since Saturday that began with the compromise of more than 1,100 mostly Italian Web sites. Websense claims that more than 10,000 sites have been infected by now, 80% of them in Italy. There are indications that most of the Italian sites are resident at the same large Italian hosting provider. Trend Micro reports on the attack, which is launched from a malicious Iframe tag inserted into pages on compromised sites. For visitors to these sites, this begins a cascade of "drive-by" malware downloads if one of several targeted vulnerabilities is available and unpatched. The first page to which visitors are redirected by the Iframe hosts a recent version of Mpack attack software. Panda has a month-old report on Mpack (PDF) that provides copious detail about its nefarious ways.
Re: (Score:1, Troll)
Re: (Score:2)
Re: (Score:2)
For an OS supposedly open and free and for "The People", the aforementioned "STFU n00b" is endemic.
Re:Why do they never come right out and say... (Score:4, Insightful)
The day your favorite OS dominates the market, it'll be pwned, don't you worry. And I say this as 1) a Firefox fan, hoping that it never gets to be the majority browser for precisely that reason, and 2) a fan of all the OS's. I use Windows for my desktops, Linux for my servers, and Mac sometimes to play. They all have fans, and I don't feel the need to belittle any of them to make one of the others look better. It doesn't work that way.
Hope I don't get modded down - I'm not so much flaming as ANTI-trolling if you catch what I"m trying to say. heh.
Re:Why do they never come right out and say... (Score:5, Insightful)
If market share is any indication to being pwned; then why isn't Apache attacked more that IIS? According to Netcraft Apache has 53.76% of the market compared to MS: 31.83%
And I say this as 1) a Firefox fan, hoping that it never gets to be the majority browser for precisely that reason, and
I personally only want FF have enough of the market; just enough to make companies follow the web standards: IE not catering to only one browser. Actually, the same applies to ODF; just enough to make companies not require a specific Office Suite.
"2) a fan of all the OS's. I use Windows for my desktops, Linux for my servers, and Mac sometimes to play."
Use what ever works for you.
Re: (Score:2)
Re: (Score:1)
Defacements.... (Score:4, Informative)
What the parent poster talked about was the very low amount of Apache-targeting viruses and exploits compared to those targeting IIS. Apache is the most widespread server software, but IIS is the one that gets most viruses.
And most of the time this kind of vector is used as described in current article : as a way to get control on machine to distribute malware and/or be used in a botnet.
Whereas, what you speak about - defacement - is done in most of the case, by stupid script kiddies who just use some random tool to exploits bugs (either remote execution or SQL injections) found in common PHP script (forum engines, etc.), it is mostly server independent. Apache or IIS doesn't matter as long as poor script code is present with known vulnerability. Therefore, you're very likely to find that the defacement frequence follows closely the market share of the servers.
Most of the time, the script kiddie just put "I am teh 1337 r0xx0rs !" in the front page. You can't do much with a compromised script (you can't start a IRC server, put a zombie bot, a full mail server for spitting spam or use it as a starting point to infect other servers in the vicinity).
yes, but... what's the server running? (Score:2)
Re: (Score:2)
Re: (Score:2)
Then, you go out and hack a whole bunch of other sites -- in this case, all apparently IIS-based, for reasons I won't speculate on -- and add the bad IFRAME, which points to the backend server.
Joe User visits the compromised site, which has the bad IFRAME. It points his browser to the backend, which has the rootkit-delivery software, which uses one of many known browse
Re: (Score:2)
Also, Netcraft counts host names, not servers. There is no current information on how many servers are IIS versus Apache, but netcraft information on physical server market from around 2001 indicates that with similar hostname ratios as today IIS had about 50% of the server marker.
Re: (Score:2, Informative)
Re: (Score:2)
Re:Why do they never come right out and say... (Score:5, Informative)
The summary and linked articles don't even say that. Only Panda's MPack report, a dozen pages in, starts to list the actual vulnerabilities targetted. Which are IE, WMP and one Opera bug. However, the malware is actually modular in which new vulnerabilities can be plugged in, so this isn't static, and they say new versions come out about once a month.
Nevertheless, unless the WMP vulnerability works on multiple browsers, it's just Windows IE (duh) and Opera. No mention of Linux, Mac or Firefox I saw.
Re:Why do they never come right out and say... (Score:4, Informative)
" 1) A Trojanised WMF File (Downloader)
2) ActiveX/OCX File (dropper)
The downloaded malware, when executed, installs
1) A rootkit "
Most of the world is in denial about the whole security issue surrounding
Windows. Even some of the postage on
*want* to know, that's why they don't post it.
[*] - http://blog.trendmicro.com/italian-job-vs-italian
Re: (Score:1, Funny)
Re: (Score:2)
Re: (Score:1)
MS is the most attacked company because of two reasons, first they have no ethics and don't think twice about screwing the consumer by lockin and predatory licensing schemes. The second reason is that all MS formats are MS formats, there are no other products that effectively use those formats (lockin, this relates back to point number one). If OSS (Linux) reaches MS levels of market share it will not suffer the same amount of attacks, or even half as many. This i
Re: (Score:2)
Precisely the reason that no OS should dominate the market. Homogeny just means a bigger target.
Re: (Score:2)
I'll be very worried when some malware forces me to log into the Admin account on my Mac, run the malware installer, entering my Admin password and hitting return.
Re:Why do they never come right out and say... (Score:4, Insightful)
Everytime some vulnerability is found, someone shouts about not using Windows, especially these Apple lovers. Come on guys, can we stop this? These so called malwares target novice users, not Slashdot users. Tell me a single alternative your mom can use and I will take it. The so called alternatives are either too_expensive (suggest your mom to shell out 2K on Mac just_to_get_on_internet) or too_not_userfriendly. Why not stop beating the drum on Windows?
Re: (Score:2)
My father uses Mandriva. So does my wife. My four year old daughter currently uses Kubuntu.
None of them could install Linux for themselves, but they have no problems using it.
1) A bottom of the range Mac costs nothing like that
2) Install Linux, say "this icon starts the web browser, this icon starts the email program". What is so difficult about that?
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
- Install whatever distribution you prefer
- Install fluxbox
- Configure fluxbox so you have a static menu on the top left with the applications that they might want to run
- Install Firefox
- Install Thunderbird ( added wmpop3 so he don't have to start the mail client to see if he has any mails )
- Install Openoffice
- Install GPhoto2
My dad has a keyboard with a few multifunction-keys on the top that i mapped to the different workspaces. It seems like he has problems with under
Re: (Score:2)
2. My mom, brother, girlfriend (and, soon, aunt) are using linux. It's not user-friendly, but once I set it up, it works and they don't have to screw around with it.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
granted, same thing happens with Windows, but it seems to happen more severely with Linux in my experience. i seemingly need to make use of the command line much more often in Linux problem solving than i do in windows, and while that is no problem for me, it's extremely intimidating to most users.
Re: (Score:1, Insightful)
Let's see, users are asked to use a commandline and they say "I've got no idea, how much do you charge?"
--compared to--
After a long series of condescending dialogs over what was otherwise a minor problem, the user has now unwittingly completely trashed his system. She's on the edge of a nervous breakdown and doesn't know who to trust, because her 4 calls to Microsoft tech support led her down 8 different blind alleys, and her friends have all told her to just reload, but make a backup first, and she's th
You misspelled truth (Score:1)
Re:Why do they never come right out and say... (Score:4, Funny)
Re: (Score:2)
Re: Viruses/Viri/Virii (Score:5, Informative)
Yes, viri/virii is incorrect (for now), but when the vast majority of us don't RTFA (or can't, due to the
Re: (Score:3, Interesting)
Yes, viri/virii is incorrect (for now), but when the vast majority of us don't RTFA (or can't, due to the /. effect), you can hardly expect people to figure it out all on their own ;)
If we speak of groups of virus types (that is, a species), there are different forms used depending on whether we're speaking of a family, genus, etc. (if you read the full wikipaedia article, and if you studied it in uni):
Now the individual virus is a virion, which probably has its own possible plurals, to make matters worse.
But viruses is the correct plural for English speakers, by convention, but I remember the virulogist
Viri/Virii are wrong in any case (Score:2)
octopuses anyone (Score:1)
Re: (Score:1)
Re: (Score:2, Informative)
Re: (Score:1)
Re: Viruses/Viri/Virii (Score:4, Informative)
But I agree with you, virii is both bad English and bad Latin.
Re: (Score:1, Funny)
Here, here! Whomever reads slashdot, their things like this that effect how your percieved. Its rediculous, to!
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Parce mihi, "Spare me," everyone here remembers Latin grammar worse than I do.
vir, plural viri, masculine, 2nd declension, "man"
virus, 2nd declension neuter, "venom" or "toxicicity"
bacterium, 2nd declension neuter, plural bacteria
We don't have any surviving attestations to a plural of virus, or AFAIK, any -us 2nd declension neuter. The meaning is by nature a collective noun: you don't hear "Potassiums" very often, do you? Or is it Potassia? My own sense is that the neuter-plural-ends-in-a wins out
Re: (Score:1)
Re: (Score:1)
Set.
Match.
Re: (Score:1)
Re: (Score:2)
Not to mention, the "language is evolving" argument doesn't mean that just any invented word is ok to use. Language evolves over time by itself, not because we're telling it to evolve.
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:2)
Can we help it if our apps are just better written than the ones you choose to use?
Re: (Score:1)
I wish they'd count "servers" and not "sites" (Score:5, Interesting)
But this method of artificial number inflating is to be expected from an industry trying to promote their anti-malware, anti-virus, anti-spyware, anti-trojan, anti-anti-virus, anti-rootkit products. Anyone actually requiring these craplets to be installed on their dedicated servers have a much larger problem between the keyboard and the monitor to worry about.
Re: (Score:3, Insightful)
and, incidentally, imho software companies should be liable f
Re: (Score:2, Insightful)
Never will happen.
The software vendors cannot control what 3rd party software run with their software -- not even a pure 'monoculture' PC from the OS up.
Hence the usual longwinded boilerplate EULAs that REALLY only say 3 things:
1) Do redistribute our software.
2) Do not reverse engineer our software.
3) This software is "AS IS". Use it at your own risk. We are not responsible for an
Re: (Score:1)
Re: (Score:2)
So you want same laws for computers that concern cars? Since its law(s) that's regulating car modifications, not some EULA or any other contract. So everytime you do some modification you have to get some authority to check if it was OK. Personally I would find it annoying if I was to bring my computer to inspection after every software I install or write myself.
Re:I wish they'd count "servers" and not "sites" (Score:5, Insightful)
There are many web hosting companies and some of them negate their responsibility to Internet users at large.
The web hosting industry does not get much attention from free software developers. This is broadly because they want to insist that anything they spend money on develping not be usable by their competition. As such, no company (under the terms of the GPL) may make any developer sign any kind of non disclosure agreement for the purposes of receiving GPL code.
The web hosting industry is stuck in a rut of its own design. It uses software that it can't modify to meet its real security needs because nothing exists free that has all of the working features that their customers demand.
This is the problem, this will continue to be the problem for quite some time. Even if a free control panel and billing system were realsed that they find suitable it would only be after perhaps a couple years of development and testing.
Sad, but true. The industry is making us all a victim of its success. It sells the use of GNU/Linux computers pocketing all profits and only giving back to companies that produce software that is not free.. totally against the tit-for-tat that made it such a lucrative market to begin with.
You're right, but you left out some stuff.
Re: (Score:2)
Re:I wish they'd count "servers" and not "sites" (Score:5, Informative)
Trivial passwords (single English word of five characters) were guessed as well as slightly more complicated ones (non-English words, eight characters, random numbers inserted).
It appeared to me that were the host NOT the problem, that bots might have been guessing the passwords through brute force? I searched the net seeing if I could find more information about these attacks, but there wasn't much out there, especially given that there wasn't much to search on besides the fact that they used an IFRAME or JavaScript DeCode function, and a probably random set of IP addresses.
Anyone know more about it all?
Re: (Score:2)
Re: (Score:2)
So, if that were the case and it took a certain level of effort to get past low-medium level passwords, then realistically it's just a matter of time before tougher (12-15 randomised characters) passwords get done?
Re: (Score:2)
Previously, I had a password in the form of AAANANAA (A=alpha, N=numeric) guessed. It wasn't a dictionary word or combination of dictionary words, and the numbers were not their typical I=1, A=4 replacements. I had assumed it would be non-trivial to guess and that there would be a system in place to limit on-going login attempts, even if coming from a range of IP addresses (e.g., botnet or whatever).
Of course, even if you suspect the host, there's only so far throwing a
Re: (Score:2)
Anyone know more about it all?
It would help if you actually identified the hosting company. One "big, usually decent hosting company" that I am familiar with, that hosts about 3,000 sites per server, had at one time a password-hash file that was readable by anyone with an account on the server. All you had to do was download the file and run a password cracker on it and you could recover a large number of user passwords. I warned them about this 10 years ago. They thanked me and did nothing. It may
Re: (Score:2)
If it wasn't a brute force guess of the passwords, then I think you might be right about the shared server being infiltrated. If that is the case, then it's such a shame that one can get stuck in the dark because the host is too embarrassed to reveal the truth - e.g., waste days trying to research possible threats and causes.
Re: (Score:3, Interesting)
between the keyboard and the monitor to worry about.
Did you mean between the keyboard and the chair? Because all I see between my keyboard and my monitor is a desk with a dirty shot glass, a lighter, a knife, a case screw, two dimes, two empty cups of hot sauce, an open bottle of safeway-brand "personal lubricating liquid", and a bag of grass ...
So you may be able to understand how I'm totally lost here.
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
You forgot to mention the packet of tissues.
I live in a studio apartment. There's a paper towel rack on the other side of the room.
Re: (Score:1)
Re: (Score:1)
Queso scan (Score:1, Funny)
Mafia spam? (Score:5, Funny)
Re: (Score:2)
Was it one of these? [kropserkel.com]
This is the... (Score:1)
"You're only supposed to blow the bloody doors off!"
It's all Microsoft vulnerabiltiies (Score:5, Informative)
Note that Trend Micro never uses the word "Microsoft". That's deceptive. How does Microsoft manage that? This attack depends entirely on vulnerabilities in Internet Explorer and Microsoft Media Player. It does try to attack Firefox and Opera browsers by sending them Windows Media files, but doesn't have a direct attack on either browser.
So:
Re: (Score:2)
That is because to most people "computer" means something running Microsoft Windows. Saying that computers running Windows were involved would be like saying "the accident involved cars with internal combustion engines." That, and reporters don't really care about educating their readers, they just care about making the publication money.
And that is my bad attempt at an automotive analogy.
Re:It's all Microsoft vulnerabiltiies (Score:5, Insightful)
Even simplier:
Re: (Score:2)
I'm still trying to figure out how it managed it without being connected to a network...
Re: (Score:1)
What web servers are vulnerable? (Score:1)
Tiscali? (Score:3, Informative)
"Apparently, most of these sites are hosted on one of the largest Web hoster/provider in Italy."
Why would I not be surprised if Tiscali's webservers were somehow to blame?...
Re: (Score:2, Informative)
Is this the... (Score:1)
After the title... (Score:3, Funny)
A malware question to the comunity (Score:2)
I've been hit with win32.Perlovga.A on a secondary computer through an infected USB key. That machine had no anti-virus and autorun was at that time enabled (stupid). This particular crapware saves two EXE files (copy.exe and host.exe) and an autorun.inf that executes copy.exe to the root of each volume. When the infected USB key was plugged-in, it loaded the mallware.
I
Re: (Score:1, Informative)
Ideally, this would be burned from a computer know to be unaffected.
Re: (Score:2)
I haven't realized that the UBCD full comes with INSERT. Will try it out later today, thanks for the tip
Italian Job? I'm confused (Score:2)
YES (Score:2)