Chinese Security Site Under New Kind of Attack 73
SkiifGeek writes "The main site for the Chinese Internet Security Response Team (CISRT) has been serving up infrequent attacks against site visitors through the use of an injected IFRAME tag that attempts to download and install numerous pieces of malicious software. While the source of the attack has yet to be identified, suspicion is that it might be an ARP attack being hosted by the CISRT's hosting provider. Rather than a straight-up infection attempt against all site visitors (as was the case with the Bank of India hack), it is an interesting evolution to see intermittent attack attempts against site visitors."
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
But HOW? As I said, first running of IE on fresh install after automatic updates and leaving computer overnight. On previous installations there were no adware at first, only after some time. So this was a test to check if it got there by itself. No one other than me had access to this computer. So windows 2003 is TOTALLY not secure (by default). I don't say it's less or more secure than apache+linux, but I have yet to have some virus on m
Re: (Score:2)
Oblig. car analogy. (Score:2)
IIS != IE (Score:1)
The Internet Exploder however - well, it's reputation is well ahead of any statistics, as my de-wormed Windows boxen demonstrate.
Re: (Score:1)
Re:CSIRT is dying (Score:4, Informative)
They use Apache methods for uploading files, major fix over IIS6.
The security is modular and supports security similar to what Apache does.
And the configuration files are now text files which edit with your text editor. Wasn't that the main selling point with the IIS pros saying IIS was better because you did not have to use some text file where you had to go in manually edit?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
FTFA... (Score:1, Insightful)
We are very sorry that when sometimes visiting our some pages, malicious codes are inserted. We think it doesn't mean that our website has been compromised. It's maybe due to ARP attack. We have informed our webserver provider to help us check whether it's due to ARP attack or not.
Ummmm... I think if malicious code is inserted into your site, it's been compromised.
Re:FTFA... (Score:5, Informative)
Read up on ARP spoofing . The basic theory is that another machine at the same webhost is pretending to be the gateway to the internet, and so all traffic gets to flow through it and it can modify it as it wishes. [wikipedia.org]
Re: (Score:1)
Re:Injected (Score:1)
Re: (Score:2)
Read up on ARP spoofing...[SNIP]
Which is why SSL should be more commonly used. Seriously - an SSL cert costs less than a hundred bux/year, or less than two hundred bux per year for one that allows wildcard subdomains [rapidssl.com] and completely defeats this, and loads of other attacks. (No, I'm not affiliated with RapidSSL, but I am a happy customer)
The nice thing about wildcard SSL is that it effectively allows you
Re: (Score:1)
Re: (Score:1)
For example:
Say the webserver of the victim site has a public IP of (1.1.1.1), and a MAC address of (11:11:11:11:11:11). Its home page is (index.html).
The vict
Re:FTFA... (Score:5, Interesting)
The CISRT should know better than to use http without SSL.
Re: (Score:2)
Some people don't have infinite amounts of money to spend on the CPU to encrypt every byte of their homepage every time someone hits it...
What's really needed is a signed HTTP solution that doesn't require full-stream encryption; if the user is submitting no data and the data being served is not secret, illegal, confidential, etc. there is no reason for full-stream encryption but a signature would prevent this sort of attack.
Re: (Score:1)
Strange Choice of Target, eh? (Score:4, Interesting)
If this really is an ARP-spoofing based attack all other sites in their providers location ought to be vulnerable too and would make better targets, don't you think?
By the way: what's the point in occasinally inserting the attack code (it will get detected sooner or later, no matter how often it's inserted, 100% of pageviews over 2 days would probably be better than 10% over a week)?
Re: (Score:3, Insightful)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
If you read the site, people go to this site to post questions when they are having problems. It is not only a "security" site for those of us who are security practitioners, but it is also a forum where non-security people can ask questions or ask for help.
Actually, it's a great target because one would think that a security site would be safe. And, due to the nature of this attack, there is not much that the site's operators could have done to prevent it (other than the obvio
Re: (Score:1)
Re: (Score:1)
A) They're renting webspace, not a dedicated box.
B) The ISP's *gateway* gets the spoofed ARP replies, their content is being reverse proxied thru the attackers server (why not, it may after all be the weakest link)
C) They didn't secure their box.
Interesting? (Score:5, Funny)
Yes, if by "interesting" you mean "annoying". And by "evolution" you mean "I wish all malware creators would curl up in a corner and die."
Re:Interesting? (Score:5, Funny)
For example, they laugh when you are infected with malware.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Common knowledge (Score:4, Informative)
Attacker on GoogleB farm's network --> man in the middle (for an hour a month) --> undetected --> redirect to malware cocktail site Visitors --> replicated Google --> view infected page
Technically its possible provided the MITM attacker is on the same network, the network engineers didn't mitigate against it, someone is really determined.
We've all (hopefully all of us) have heard of the "Storm" botnet. Its not an exaggeration to think of someone getting their act together and creating something on this level of an attack vector. The question is _when_ will it happen. Who knows for all you know Slashdot was loaded with a cocktail of malware when you visited this site. Hope people get a clue and keep their machines clean. There's not silver bullet solution when an attacker is 1) skillful enough 2) undetectable nowadays 3) has major motivation (finance).
Re:Common knowledge...firefox? (Score:1)
these malwares on your pc??? If this is not the case, then what about the same thing but inside a vmware install??? would it not curtail the threat while browsing the internet?
Re: (Score:2)
http://www.infiltrated.net/scripts/dsphunxion.sh [infiltrated.net]
http://www.infiltrated.net/scripts/dsphunxion.output [infiltrated.net]
The concept was a pseudo heuristic worm to be download via vuln on a Linux box. Caveats... Surfer would have to be root... Could be re-written to exploit something else to gain root though. Someone with modsecurity skills could do a re-write based on header information and redirect Linux boxes to their appropriate pages to download and exploit it though. A
Re: (Score:1)
I know when I am in the presence of greatness....again if you were the one to write the code.
My compliments on the actual proof of concept though, beautiful!
Care to elaborate on what your stem would be for accomplishing further steps, as the person
accessing the page may not really have root, would there be a way to own the machine regardless
of root access, maybe using a redirect to a process that does have root, say calling from firefox'
Re: (Score:2)
Re: (Score:1)
I know this philosophy of using vmware may not be the original intent for its deployment, but
short of creating your own os to be 100% certain that no malwa
Re: (Score:2)
Eventually your malware will overwrite your snapshots or the binary that restores them.
That said, the OS [bell-labs.com] I use has daily snapshots (or as often as you like) to a central server (thus enabling coalescing of data blocks i.e. repeated blocks of data are stored only once). The choice of which snapshot to use is per process, so, for instance, you can compile yesterday's code in one window and last weeks in another and see what changed. Or boot any terminal into last month's state of a
Re: (Score:1)
"And they told me i couldn't play 7/8, I just did 2 bars of 3/4 and a 1"
Re: (Score:2)
Boot diskless and you don't need to image your disks and hope for the best because all of your terminals are just that, terminals. Storage belongs somewhere safe. These days cheap high speed networking should be making disks redundant in a LAN situation. The place is a damn sight quieter consumes less energy.
There's a lot of places a 500Mhz EPIA fanless will do just fine.
New? (Score:4, Informative)
I've since moved to a Hong Kong server running BSD/Apache. Much cheaper, I get an actual control panel, and I'm not subject to the ridiculous requirements of the ICP permit. You know what you have to go through to get one of those for a business? Insane! And don't even mention that you're a foreigner, they go apeshit.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
There are 3rd parties that can do this for you also.
ARP Attacks (Score:2)
shame, but it's a lie (Score:1, Informative)
is it possible (Score:1)
nice tag (Score:1)
Chinaons.com (Score:3, Interesting)
I would really like to be able to make certain folders on my ipod read-only password protected when I plug it in, so I know this isn't happening.