



Storm Worm Evolves To Use Tor 182
An anonymous reader writes "Seems like the Storm botnet that was behind the last two waves of attacks is also responsible for this new kind of social-engineering based attacks, using spam to try and convince users of the necessity of using Tor for there communications. They 'kindly' provide a link to download a trojaned version of Tor. This blog entry has a link to the original post on or-talk mailing list which has some samples of the messages."
Are we late to the party? (Score:5, Interesting)
It just makes sense, and is obvious, and a natural progression of the technology..... Hey! Maybe I should write a patent!
Comment removed (Score:5, Interesting)
Re:Are we late to the party? (Score:5, Funny)
Unlikely (Score:5, Funny)
Re: (Score:2)
Comment removed (Score:4, Informative)
Re: (Score:2, Interesting)
Since storm is controlled peer-to-peer, shouldn't it be possible to co-opt it into sending out anti-virus spam?
The real problem with a huge/scary bot net like this, is not that a small group of people can control it, but that in theory anyone can take it over for their own purposes.
Re: (Score:2, Funny)
If you are not sure if you should install this program, get more information at http://www.evil.org/malware/installer.exe!
Re:Are we late to the party? (Score:4, Interesting)
The main problem though is closed source. If source is closed, then there is no easy way to find malicious code before it is deployed on your system. Ok, I'm speaking as a programmer, so that would be useful for me, not a non coder. Still, the point remains, binary distribution only means trouble, be it storm, a sony rootkit, or just 'phone home' code in a program.
What we need is something sort of like gentoo, where all programs are compiled locally, and the code can be inspected for malicious intent. Alas such technology, while it does exist, does not exist in a form that could be disseminated and used by people with no technological background. This is a pipe dream for the moment, I know this. Especially since I tried once to compile openoffice locally (18 hours I think). Perhaps trusted compile farms that deliver fresh binaries?
Waxing lyrical I know, but there has to be an answer somewhere.
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2, Funny)
Re: (Score:3, Insightful)
Real programmers don't need source code. (Score:3, Funny)
Oh come on! You aren't a real programmer. Everyone knows the binary is the source code. My uncle eddy doesn't even need those fancy disassemblers or debuggers. He edits memory by looking at LEDs and flipping dip switches. Now that is a real programmer.
Re: (Score:3, Interesting)
The main problem though is closed source. If source is closed, then there is no easy way to find malicious code before it is deployed on your system. Ok, I'm speaking as a programmer, so that would be useful for me, not a non coder. Still, the point remains, binary distribution only means trouble, be it storm, a sony rootkit, or just 'phone home' code in a program.
Not really. In a binary I can at least in principle parse rudimentarily for things like "does this ever call the TCP/IP stack" and raise a fl
Re:Are we late to the party? (Score:5, Insightful)
Of course, they then follow the original link from the worm and they still get the trojan. So close, and yet so far... sigh.
Re: (Score:2)
Re: (Score:2)
Re:Are we late to the party? (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Insightful)
Are you kidding? If you could trace back a tor link to gaysex.com/bathroomEncounters.mpg to Senator Larry Craig's machine, don't you think TV shows like Dateline would be offering you tens of thousands of dollars for it?
Um... excuse you? (Score:4, Funny)
Re: (Score:3, Insightful)
Storm is still a trojan, not a worm (Score:5, Insightful)
Re:Storm is still a trojan, not a worm (Score:4, Insightful)
Oh no, the internet's doomed!
Re: (Score:2)
Ummm. (Score:2)
Re: (Score:2, Insightful)
Re:Ummm. (Score:5, Funny)
Re: (Score:3, Informative)
What is surprising is that it's taken so long for the spammers to realise that by investing ih a high tech, well engineered solution they can make far more money than the low tech solutions we've seen in the past.
Re: (Score:2)
Unfortunately over time they have hired some reasonably smart programmers and those guys have built up techniques that are now hard to beat. Also, a lot of the small fry spammers have been closed down by filters and controls (the main problem they now generate is funding the hard core spamemrs by buying their spamming services and software). So spamming has evolved by survival of the fittest.
Re: (Score:2)
Spelling... (Score:4, Insightful)
Speaking on topic, I'd like to correct one of the previous posters: it's not a mere variation on the "Use XXX Bank" theme; as far as I understand, Tor has been picked among tons of other software that could be infected and supplied to users because it helps the spammers in covering their tracks, since their email is routed through Tor now.
Re: (Score:2)
I had always heard that Tor was not useful for sending spam, since it imposes so much overhead (ever notice how much slower everything is on Tor?). Besides, if a botnet is being used to send spam, what would Tor be useful for, except maybe anonymizing traffic between the bots and the master
Need editors who EDIT (Score:5, Funny)
Perhaps we could make the distinction clear this way: A machine that sells soft drinks is often referred to as a 'vender', while the guy selling hot dogs is more likely to be called a 'vendor'. With that in mind, I have toyed with a similar convention for other verb+er nouns:
It's got as good a chance of adoption as *bibyte does.Now, if Cmdr Taco could just get editors who actually EDIT... Oh. He's the 'editor' who ran this story? Never mind.
Re: (Score:2)
Dear God, I hope not. It (*bibyte) has polluted Wikipedia for damn near every article dealing with storage space, communications, and data.
Who is behind the Storm Botnet? (Score:5, Interesting)
While the article does contain a lot of speculation and sketchy sources (like the above quoted Azizov) the evidence does seem to be pointing in a particular direction:
It's starting to look an awful lot like another Cold War is coming, except this time it will be a Cyber war waged by turning your enemy's (and the rest of the world's) poorly secured computers against their critical infrastructure while the actual government absolves itself of blame. Nice.
Re: (Score:2, Flamebait)
Re: (Score:2)
So, now mod me flamebait and let's go on with our lives as long as we can. Sorry for the rant, but I'm really getting fed up. For every crappy thing in life you need some license, some test, some qualification, or at least you're liable if you turn out to be too stupid to operate it safely. But on the 'net...
Why? Personally, I think you're 100% on target. Fifteen years ago, loss of internet connectivity was a nuisance at worst. Now, it could be the difference between your business turning a profit or folding. The 'net is central to many businesses, and if if an entire country can be taken offline, it'd be trivial to do it to, say, a rival corporation. Most banks are pushing their online banking systems for all they're worth - I can easily see a bank taking out a hit on their opposition's website, complete loss
Re: (Score:2)
Unfortunately, people are too stupid, careless or simply negligant to work that way. We want to have rights, but we'd rather not deal with
Re: (Score:2)
Re: (Score:2)
In fact is there even a reference to this in the article you cite?
Re: (Score:2)
Re: (Score:2)
F
Re: (Score:3, Insightful)
Who are the stormbot people? (Score:2, Interesting)
Re:Who are the stormbot people? (Score:5, Informative)
Re: (Score:3, Funny)
So would IPv6 actually fix this? (Score:2, Interesting)
Even if you weren't ideologically predisposed to sending in the SEALs to whack people
Re: (Score:2)
I only have a cursory knowledge of IPv6 but I don't believe there's anything in ther
Re: (Score:3, Insightful)
IPv6 only includes the MAC if it is configured using Stateless Autoconfiguration, and if Privacy Extensions are not turned on. If it is configured using some stateful method, like DHCPv6 or a static IPv6 address, the address could be anything. Likewise, if Privacy Extensions are turned on, then Stateless Autoconfiguration will rotate among random address that don't include the MAC, but are still unlikely to collide with other hosts' addresses.
But what g
Re:Who are the stormbot people? (Score:5, Interesting)
The people running this botnet can choose from millions of computers they want to use as anonymous bouncers/routers. And they can tripwire their nodes so that after 30 minutes of use as a bouncer, the hard disks are overwritten with 0's (although in most cases this isn't required as IP addresses wouldn't be stored anyway).
A chain of 20 hacked computers spanning the globe operating as routers is not easy to trace. You have to talk to each owner in the chain one-by-one and catch the bounced connection in realtime to reveal the IP for the next node in the chain. And the attackers can obfuscate their presence by programming their bots to simulate these proxy connections at random. Imagine having to trace through 100,000 chains, each containing 20-30 routing nodes. These chains are completely dynamic and randomly change every half an hour.
The Storm botnet is almost the "perfect hack" unless the perpetrators make some big mistakes. If the owners of this botnet installed Freenet on all the bots, we'd have an unenforceable darknet which can only be blocked (maybe! - if you're really lucky) at the ISP. Anyone could tap into this new darknet and do as much internet crime as they like without ever having to worry about getting caught.
Re: (Score:3, Interesting)
So work from the other end. How do they make their money? Sending spam, apparently. How does spam make money? Currently, either by getting suckers to send money to them (viagra, Rolexes, etc) or pumping stocks the spammers have bought. In both cases, there must be a money trail, much easier to track than chasing a chain of proxies. T
Re: (Score:2)
--Phishing, with the fake sites hosted on compromised machines
--Racketeering - "That's a nice website you got there. It'd be a shame if something....happened to it, capiche?"
--Mercenary - one company/country/individual pays the botnet owner to DDoS or crack an enemy's machine
Now the first of these leaves a money trail of some sort, as long as the phisher does a wire transfer. If it's a credit-card phishing scheme, it's much harder to trace, partic
Re: (Score:2)
Yes, some would be hard, some easy. But these guys probably launch attacks very frequently, Once a week -- once a day? If even a small percentage of attacks/scams/etc could be tracked back to them, and they faced criminal charges they wouldn't be so cocky. Now only a few are caught per year through incredible stupidity or carelessness. They feel invulnerable. Pick some of them off and this would change quickly. Perhaps attacking infrastructure is
Re: (Score:2)
Re: (Score:2)
Comment removed (Score:4, Insightful)
Look at the timeline. (Score:2)
The killings are "down" in that each section has pretty much killed everyone they didn't like in that section. Or the people that were being targeted have run away.
But warlordism is not a basis for a stable country. Which is why Iraq's "
Re: (Score:2, Insightful)
That's not true, particuarly, in Anbar. What happened in Anbar was that Al Qaeda was very popular because the people saw two things: a) the USA was overwhelmingly pro-shiite at Sunni expense, and that b) Al Qaeda said they were anti-American. However, Al Qaeda tried to establish a very strict brand of Islam, and started doing things like execut
Re: (Score:2)
Re: (Score:2)
e.g.
http://www.blackwaterusa.com/ [blackwaterusa.com]
Re: (Score:2)
I do hope that given time, the truth will be revealed. However, with lies being spread and believed on both sides, it's sometimes hard to be optimistic.
As for dictators enslaving people, that is something I have never supported and n
Re: (Score:2)
I would note that millions of people who liked the USA in Vietnam were executed after you left wingers sold them out.
First, it was Nixon (hardly a left-winger) who finally got us out of that shit-hole. Second, that assertion handily ignores the fact that there was no reason for us to be in Vietnam in the first place. South Vietnam was not in a strategic location and it was hardly a paragon of representative democracy.
In the meantime, the USA has liberated Afghanistan from the Taliban, Iraq is on the
Re: (Score:2)
When your users are illiterate ... (Score:3, Funny)
Re: (Score:3, Funny)
Misleading headline (Score:5, Insightful)
The spam email in question tells the reader that, if they are running torrents, they should use this Tor thing to cover their tracks. The link points to the trojan. The file in question is about 150K in size, or about 20x smaller than the Windows version of Tor (2-3 MB) on the actual site [eff.org].
I posted a warning about this very email on a well-known anime site since I suspected some people there might download it in response to the e-mail.
There's also a version that poses as a YouTube video.
Most of these emails have URLs that use IP addresses, not domain names. Between my SpamAssassin rules and Mozilla Thunderbird's built-in anti-malware protections, messages like these are either quarantined or tagged as dangerous. I've not seen an legitimate email from any correspondent that uses URLs with IP addresses in the host part.
I opened the YouTube version in a Windows VM that had Kaspersky installed. It identified an attempted replacement of tcpip.sys and told me it should be quarantined. Unfortunately a ClamAV scan of the file did not detect anything suspicious.
The largest problem with Anti-Virus software is... (Score:2)
In order for pretty much all Anti-Virus software to work, you're skimming for signatures patterns in the bytes
that leave a tell-tale for the software to "identify" it. It's always lagging by a bit, by the reality of the situation, so
it's truly a reactive solution to a problem that needs more of a proactive one.
That's not to say that the software is not useful for detection of attacks (much like an IDS is for networking...)
Re:The largest problem with Anti-Virus software is (Score:2)
Re: (Score:2)
Today's version of these scams is a phony NFL Game Tracker.
"Football Season Is Finally here!
We can keep you on top of every single game this season.
Get all your game info daily from our online game tracker:"
Once again the spam sends you to a site using a URL with an IP address in the host part.
I propose a nationwide education campaign (Score:2)
My suggestion:
Setup a nationwide network of community educators. Local organizers
Re: (Score:2)
Re: (Score:2)
I think
Re: (Score:2)
When their ISPs cut them off for spamming, or their personal information is stolen, or any other number of malware things happen... maybe they'll get a clue.
My question is.. (Score:3, Insightful)
I mean this might create an "arms race" where they continue to lock down access to the botnet, but I would love to see the looks on their faces when large sections of the botnet stop responding to commands.
Seriously as "Brilliant" as these guys are I guarantee there are probably people smarter that can crack their network. I know what I am talking about is probably not legal, but it surely is ethical.
There was such a anti-worm worm... (Score:3, Informative)
from the above article. (Score:2)
Railway and freight hauler CSX had to stop trains because of the Nachi worm, the Associated Press reported.
Airline Air Canada canceled flights on Tuesday because its network couldn't deal with the amount of traffic generated by the Nachi worm.
Though it cleared out the blaster worm, it created a hell of a lot of damage itself by the mere fact that it clogged networks with traffic.
Re: (Score:2, Insightful)
In this situation, the beauty is that you don't have to create a "worm" in the classical sense. Each infected client maintains a "peer" list so all you do is "fix" it's peers, it would cause a cascade failure of the botnet and use up much much less
antibot p2p worm (Score:2)
Re: (Score:2)
There is a certain beauty to playing core wars on the live internet.
As for why not, law enforcement and the courts (at least in the U.S.) are notorious for not taking intent into account when it comes to computer related activity. Even if the person was eventually aquitted, it sounds like a great deal of life disruption. In addition, rumor has it that the botnets are under control of the Russian Mafia.
So, the only people who will want to try this are those who are out of reach of the Russian Mafia and th
Re: (Score:2)
Just inject a new command to spread this update to all your peers and after you succeed, close down all of the command and control vectors.
No. Spread like wildfire, then after a short delay, wipe the drives.
Really.
Excepting the possibility of the worms using some 0-day exploit we don't know about yet, these are caused by people who couldn't be bothered to patch their systems, run AV scanners, use a firewall, or not click every OmGPupp1es.jpg.exe they come across. We've been telling people to do this stuff for years but no one listens because there's no real penalty for not doing so, other than the occasional sluggish computer (which pe
time traveller from 1987 goes 20 years in future, (Score:3, Funny)
"hmmm, what is going on in the far off fantastical future of 2007?"
Bringing Science and Math Into Writing?
"Ah, an age old problem"
Libraries Defend Open Access
"Some sort of Fahrenheit 451 situation? has the government gone fascist? or the russians won the cold war?"
New Legislation Proposed For Nuclear Safety
"Ah! Chernobyl is still fresh in their minds! At least it seems we didn't nuke each other"
Storm Worm Evolves to Use Tor
"SWEET JESUS! DUNE IS REAL!? AND IN CAHOOTS WITH THE SCANDINAVIAN GODS? WHATR SORT OF SCIFI FANTASY FUTURE IS THIS!"
Could it be a bit more misleading? (Score:2)
You don't have to download the file to be infected (Score:4, Interesting)
Actually, if you're using an unpatched browser, you might not even have to download the file they offer to be infected. The web page includes Javascript exploits for half a dozen security vulnerabilities, which will install the trojan without user interaction. I've posted an analysis [lightbluetouchpaper.org] of the malware code on my blog.
Despite what the article says, Storm isn't using Tor (other than trying to exploit it's reputation) and the download isn't a trojaned version of Tor – it's much too small to be that. What's more, the botnet operators appear to have dropped this strategy. While on Thursday the links in the spam went to a fake Tor download [lightbluetouchpaper.org] page, on Friday they showed a fake YouTube video [lightbluetouchpaper.org], and now they show a fake NFL game tracker [johnhsawyer.com].
This is *not* using the Tor network or software (Score:5, Informative)
====
The Tor Project, a US non-profit organisation producing Internet
privacy software, is issuing an urgent warning about a spam email
being circulated as a fake promotion for their software.
The real Tor software provides privacy on the Internet to journalists,
bloggers and human rights activists all over the world. The spam email
promotes the virtues of the software, but then directs people to a
series of fake websites that contain malicious code that will attempt
to take over visiting machines, and the downloaded software is fake
and equally dangerous to run.
The real website is hosted at http://tor.eff.org/ [eff.org] and the Tor
software can be downloaded from there. Users are able to check that
they have received the official version by following the instructions
at: http://wiki.noreply.org/noreply/TheOnionRouter/Ve
Shava Nerad, Development Director for the Tor Project said, "I am
disgusted that criminals who want to recruit more machines for their
illegal activities should trade on our reputation for providing
privacy on the Internet. Fortunately we already have systems in place
so that people can verify that they are downloading the official
software. But this is a distraction from our work that we could do
without."
====
This stuff makes us sad. But you won't even get a trojanned client, just a trojan. And the page you click through to will try to exploit holes in your browser security, so don't even click through.
Yrs,
Shava Nerad
Development Director
The Tor Project
It means that Tor is compromised (Score:2, Insightful)
If they add a large number of trojaned Tor clients to the network, it will undermine the privacy of Tor communications and allow things like traffic analysis.
This isn't necessarily a ploy to use Tor, this may be a ploy to compromise Tor.
Any chance that storm might be the work of a government?
Note to world: computer programs don't evolve (Score:3, Funny)
Sometimes they intentionally break them.
But they don't spontaneously "evolve", "mutate", or any other such thing.
Christ.
Re: (Score:2)
read http://en.wikipedia.org/wiki/Polymorphic_code [wikipedia.org]
Is Windows to blame for this situation? (Score:3, Insightful)
Can a massive lawsuit against Microsoft work?
Storm trojan depends on users, however... (Score:2)
I don't think such a lawsuit against Microsoft would work, granted the legions of lawyers at their dispoal. Also the fact that the user is infact at fault, though unknowingly for letting it in.
A zero-day worm
Re: (Score:2)
Probably they have. Odds are they're sending out a ton of different emails recommending various downloads. My server extracts all incoming attachments and puts them in a shared folder (my client machines never see attachments, just a note saying that there was one) but I see all kinds of executables coming in, with all kinds of rationales to convince people that clicking the link is a good idea. Tor is just one of them. Unfortunate
several ways (Score:3, Insightful)
Re: (Score:2)
To: Inda, some.friend@aol.com, another.friend@aol.com, one.more@aol.com...
Hi everyone,
My new email address is uncle@aol.com
regards,
Uncle
Re: (Score:2)
Nevertheless within about a week after instituting these poli
Re: (Score:2)
-Mike
"Evolve" is an apt description (Score:2)
It's the perfect description of how the attacks are responding to changes in their operating environment, and developing gradually into more complex forms. And you're more correct than you give yourself credit for: the Internet is in fact a primal battleground, between criminals intent on exploiting weaknesses wherever they can find them, and security professionals
*sigh* (Score:2)
I'm sure that the people of the Republic of Estonia would wholeheartedly agree with you that it's just "a fucking computer network". That is, until their entire electronic infrastructure locked up tight for two whole weeks and as far as the rest of the world was conc
Re: (Score:2)