Storm Hits Blogger Network 89
ancientribe writes "Researchers have discovered the Storm Trojan nestled in hundreds of blog sites in Google's Blogger network, according to an article in Dark Reading. And this isn't simple comment spam, but actual blogs that post spam, and now, Storm executable files. A researcher who's been tracking the Storm-infested blog sites says he's working with Google to clean up this latest appearance of Storm."
Re: (Score:3, Funny)
Re: (Score:1)
Violets are #0000FF
chown -R you ~/base
Re: (Score:2)
They have no idea? (Score:1, Insightful)
Sounds like somebody should be out of a job. Incompetence of this magnitude should not be tolerated.
Re: (Score:3, Insightful)
Re:Ballmer's Revenge? (Score:4, Interesting)
That's quite the glib statement, considering that worm requires so much user action (or inaction, depending on how you look at it) to infect a Windows box, it's not even funny.
Are you serious?
Oh, wait a minute... *slaps head* "Erris" is twitter's sockpuppet [slashdot.org] account, which he uses to shill his own posts.
I thought this looked familar.
Re: (Score:1)
Re: (Score:3, Funny)
When people realize how user-friendly and fast and efficient and shiny Vista is, they'll come around and realize that it really is such an improvement over Windows XP and certainly reflects the quality improvement you'd expect from the biggest company in the world spending seven years working on it, just to make those of us who use compu
Re: (Score:1)
It is odd to see so many folk who are tech savvy or would like to be, so oblivious to the fact that software and operating systems just fail to meet basic needs of users much of the time. Usability, security, stability, cost, etc. are all missing to some degree on everything. "Written by coders for coders" is often correct. It does not matter who makes it, it still sucks. Will it get better, we hope. Are most of the vendors and open source
What "so much user action"? (Score:2, Interesting)
Here are the steps to infect a Windows box.
.exe to actually get infected. If they've maintained their patches. But the people who would be do
#1. Receive email with link to infection site.
#2. Click on link to infection site.
#3. There is no step #3. You're probably infected already.
Sure, in some circumstances they'll have to download a
Re:They have no idea? (Score:5, Interesting)
I'm on the outside also, but can tell you how. Blogger has a mail2 feature where you can post to an email address that you make up, and keep secret. Like a password. With users who makeup easy mail2 addresses (then don't monitor or abandon their blogs), and millions of emails being sent by the Storm BotNet, not hard to figure out how they are getting posted. Eventually the botnet hits them, just like they do with regular email addresses, and they get posted to the blog.
And also note, the summary is misleading somewhat. The actual files that do the "infection" aren't hosted on Blogger at all. The same thing that is getting sent to peoples emails are being posted to blogs that leave their mail2 address open and easy. So you still have to fall for the click here to get infected...
This has been going on for awhile. I first saw it at least 2 months ago. It may be increasing, but not new.
Re: (Score:3, Funny)
Re: (Score:3, Funny)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:1)
Passing Fad (Score:5, Insightful)
Re:Passing Fad (Score:5, Funny)
Re: (Score:2)
Tough Call.
Re: (Score:1)
Re: (Score:2)
The sound of the word aside, I can't understand this elitist mentality I see here and other places with a computer-oriented crowd when it comes to blogging. Whenever you hear "blogging", think "allowing everyone to write on the web easily" - that's all it is. It's what we were promised in the early 90s, before most people even had computers - the ability to have our voices heard and self-publish.
For the first time in history, almost anyone can ge
Re: (Score:2)
No surprise (Score:3, Funny)
Figures... (Score:3, Funny)
Re: (Score:2)
Skynet (Score:5, Funny)
Sad... (Score:5, Informative)
It doesn't do anything technically new. The only thing new here is the particular brand of social engineering used, and it bothers me that this still works.
Re:Sad... (Score:4, Informative)
With regards to the link, they were also masked well to show up as a youtube url.
All in all I think this means that you don't have to be a total idiot to get infected, maybe just a little naive.
Re: (Score:2)
Yup, mine is still 'Mozilla/5.0 (Windows; U)', thanks to Proxomitron. No reason to make it easy for people to exploit my browser.
Re:Sad... (Score:5, Informative)
If by "masked well", you mean:
Yeah, I'd say that's more than "just a little naive" -- it's downright stupid. I don't know how Outlook does it, but Kontact/Kmail does two things: First, it defaults to displaying everything as text if it can, with a big red box at the top that says:
(Link goes nowhere, as this is Slashdot, not actually Kmail.)
After clicking that link, the HTML is shown, but without images. A similar box will be there if there are external images, allowing you to turn them on. But even with everything enabled, it's still easy as hell -- mouseover the youtube link, and the nappy IP address link shows up in the status bar.
Ok, fine, let's assume that someone can be "just a little naive" at that point -- which I think is a stretch, in this day and age; someone who doesn't know that much should take a course before touching a computer.
In that case, the last time I tried to do that, it opened up Konqueror, which popped up a window asking me what I wanted to do with this file. HINT, HINT, HUGE FUCKING HINT -- the file ends in .exe, which again, every computer user should know, means "executable". But even if they don't, every computer user should at least know not to download/open random files from the Internet, unless it's a format they recognize.
How long did it take us to convince computer users to not open attachments? And now this takes the world by storm...
In IE, if I remember, this is going to give you one prompt to download it or "open" it, and after you click "open", it will download, and then give you at least one, if not two more prompts about the program being unsigned. If you're running Vista, it will give you yet another prompt, telling you that this program needs your permission to continue fucking with your computer.
That's -- let me count -- about five separate clues that you don't even have to go out of your way to run into -- realistically, probably three or four. Not to mention the fact that my spamfilter caught most of these before I even started seeing them and training on them, and that example I just pasted to you contains the email address "jerk2werk@nehp.net" -- yet another obvious clue; I don't know anyone with an email address like that.
And there are yet more clues if you start digging -- turning on "all headers", you can see two "Received:" headers and one "Sender:" header, neither of which matches, in any way, the "From:" header.
I'm not saying that everyone should know how to dig through email headers, until they have to -- but those are just the technical "duh" factors. There's also the nontechnical one -- I didn't make a video, and I didn't upload it to Youtube. I might click that link out of curiosity, but clicking a normal Youtube link doesn't ask me if I want to download or open anything.
So what's sad to me is not only that this kind of shit still happens, but that you, like many others, consider it to be "not stupid, just a little naive." We require Driver's Education in my state to operate a car, which is significantly easier than a computer -- if you don't know how to use a computer, it absolutely IS your fault. Go educate yourself.
As for the browser vulnerability, nope, sorry, read TFA. It's the exact same thing as the email "virus" -- it just has Youtube links to an exe file. Another one is even more obvious -- the link includes the nappy IP address right there, links to a file calle
Re:Sad... (Score:4, Informative)
Re:Sad... (Score:4, Insightful)
People are dumb and horny. Not necessarily in this order.
Re: (Score:2, Interesting)
As for the browser vulnerability, nope, sorry, read TFA. It's the exact same thing as the email "virus" -- it just has Youtube links to an exe file.
Are you sure about that? I just downloaded one of the said pages that the emails link too, and looking at the source its got a massive javascript script, with what looked like to me as some exploit code. If this is the case and it is indeed an exploit allowing auto execution, then really I can't call someone stupid for falling for it, just ignorant.
With regards to the forced computer training, much like driving training people must get to drive a car, I agree, I think it would be a great idea. However, ho
Re: (Score:2)
Re: (Score:2)
Lots of people have grown into thinking that computers just get infected, and that there's nothing you can do about it. It's very sad, really.
Re: (Score:2)
and honestly it shouldn't be. We follow links to sites we don't know on the web in search of information all the time if browsers can't handle that safely they are not fit for purpose. If browser authors can't write high enough quality code then other measures (such as running the browser in a sandbox) need to be considered.
Re:Sad... (Score:4, Insightful)
It's social engineering, and it will always work until/unless we remove control of computers from the users. That's not a solution I'm personally willing to endorse. How about you?
Re: (Score:2)
but yes unfortunately humans are very often the weak point in many systems
Re: (Score:2)
That's the whole point: stop letting people BE ignorant, and force some schooling on them to cure them of that terrible infliction.
Re: (Score:2)
I saw something like that on a page described as a comcast one-click-fix page, made me glad that I scouted out the link in Firefox running in Linux; the sent by address email whois'ed to comcast, and the page address whois'ed back to comcast, but it still looked freaky to me. I suppose it could be legit, but I also suppose comast's
Re:Sad... (Score:4, Insightful)
Re: (Score:2)
It's not an error message.
Which is truly pathetic. Wikipedia has a good definition [wikipedia.org], and it's the second result from a Google search. I have another: HTML in an email makes it more than just plain text -- that means it can have bold and italic. It also means it can have viruses and spyware.
That's right -- I just explained
Re: (Score:2)
You mean, like, going out yourself to get information? Instead of expecting to be spoon fed?
C'mon, what planet are you living on?
We need to start forcing this kind of basic education on that 80% of computer users.
No. We just have to hold people liable for their own stupidity. You got infected and now your life savings are gone? Sucks to be you. No, your bank won't cover that. A fool and his money are ea
Re: (Score:2)
Re: (Score:2)
Let's think about that.
ISPs benefit, because no one's running botnets that waste their bandwidth and send tons of spam, thus marking them on blacklists.
Auction sites benefit, because no one can develop a botnet to infect others, and cause them to create fallacious auctions. And eBay in particular benefits, because PayPal now has less fraud to deal with, because no one's going to enter their paypal information on a phishing site anymore.
Har
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
For the same reason that I know red means stop, and green means go.
Because if they don't know what a program (executable) is, they won't know the difference between a harmless webpage and a harmful exe.
Re: (Score:2)
Whereas most computer users, if they adapt at all, just learn to click "OK" or "Continue" or whatever will make the bad box go away. These people deserve to be selected out.
Re: (Score:2, Insightful)
If they "should" know, but don't, the shit is still going to hit the fan. Sadly, we software engineers have to consider what a user is likely to know and build from there. Which is exactly what these Storm authors have done and what these blogging software designers should have done.
And yes, I think the designers
Re: (Score:2)
I don't think so.
If I buy a knife, and I should know not to stab myself in the face, and I do it anyway, whose fault is it?
Don't forget the nematodes (Score:4, Funny)
And 2% of worms!
And I thought Trojans [trojancondoms.com] were supposed to prevent infections. Hah.
Shortcomings of Monoculture (Score:1, Flamebait)
I demand to see the rampant
Re: (Score:2)
Yes, you obviously don't get it. From TFA:
Now tell me how MS or any other software vendor should fix their stupid users.
Re: (Score:1)
It wouldn't even be a stretch for the trojan executable to be made some ELF and slipped into !windows machines..
I do still wonder how much easier it'd be to counter if the target OS(es) were more open.
Re: (Score:1)
yer, linux boxen are part of the botnets too.
total bummer.
Re: (Score:2)
But the monoculture is still an issue, because Windows still has something like 90% market penetration. Although Microsoft caused this (to a degree), I can't say that it's something to blame on them. Without requiring the user to read some documents (and take a quiz after), there's not
Re: (Score:3, Funny)
Some sort of electric shock, sent through the keyboard or mouse, should do the trick!!
Re: (Score:2)
"We could blame Microsoft for creating crappy operating systems, but if people wanted to pay us billions for our shit, which of us would not rejoice in every bowel movement?"
Damn the nephews for all spam [backofthebook.ca]
lol (Score:4, Funny)
I just got attacked myself (Score:1)
Da
Re: (Score:2)
http://www.sandboxie.com/ [sandboxie.com]
Google does not terminate spammers. (Score:4, Interesting)
"Thousands upon thousands of *.blogspot.com pages, all spammed and used to re-direct to other spammer landing pages"
I blocked .blogspot.com referrers a few days ago (Score:3, Informative)
order allow,deny
deny from 206.51.229.
deny from 206.51.233.
allow from all
RewriteEngine on
RewriteCond %{HTTP_REFERER} blogspot\.com [NC]
RewriteRule
This has cut the formmail spam that I receive down to zero ever since I set it up.
The deny from lines take care of some guy who downloads the html submit form and posts spam from "Darksites.com", and the Rewrite denies access from all
Here is a single example from a few minutes ago:
72.47.89.233 --[30/Aug/2007:22:28:22 -0600] "GET / HTTP/1.0" 403 3931 "http://hydrocodone--4t1.blogspot.com" "Opera/9.0 (Macintosh; PPC Mac OS X; U; en)"
class action (Score:2)