Why Old SQL Worms Won't Die 64
narramissic writes "In a recent ITworld article, Security researcher Brent Huston ponders how it is that versions of SQL worms dating back to 2002 represent nearly 70% of all malicious traffic on the Internet today. 'I have made a few attempts to backtrack hosts that perform the scans and at first blush many show the signs of common botnet infections. Most are not running exposed SQL themselves, so that means that the code has likely been implemented into many bot-net exploitation frameworks. Perhaps the bot masters have the idea that when they infiltrate a commercial network, the SQL exploits will be available and useful to them? My assessment team says this is pretty true. Even today, they find blank "sa" passwords and other age-old SQL issues inside major corporate clients. So perhaps, that is why these old exploits continue to thrive."
of course (Score:5, Funny)
stop the madness! (Score:5, Interesting)
Old SQL worm's don't die (Score:1)
Besides, you can't kill what's isn't "alive"...
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Unfixed exploits? (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
User: Administrator
Password: Password
Oh, that's not you? Well it's about a million others, so who cares. Botnets aren't looking for you anal password types, they're looking for everybody else, and the non-anal-retentive password people outnumber everybody else by thousands to one or maybe even worse.
Maybe servers should have better 'default' passwds (Score:2)
Re:Maybe servers should have better 'default' pass (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
You could of course print a somewhat random formula to be used as a hash function to be fed with the serial. The user would have to calculate this by hand to find out the default password. Anything involving partial differential equations would nicely fit this purpose with the advantage of being utterly user-friendly.
Re: (Score:2)
Passwords (Score:1)
Re: (Score:2)
Re: (Score:2)
Two years later and I see that the database is still attackable via anyone with a copy of "Advanced SQL Injection" and an hour spare.
Never underestimate the power of human stupidity.
Re: (Score:2)
Re: (Score:2)
Anyone remember these [wired.com] stories [hamptonroads.com]? Someone got an ATM manual off the web, learned the default password
On
Curious blind spot (Score:1)
Is it perhaps because SQL is not something that is particularly high-profile patchwise, unlike operating systems and webservers? Or are unauthorized users running various SQL databases for internal department issues or whatnot, outside the official purview of the IT departments? Or perhaps is it a case that the ad
Re: (Score:2)
Re: (Score:1)
Well, it's a way to sell custom DB installations, I guess--whip up a glossy brochure with lots of FUD over DB insecurities, and offer a "locked down" version with an installer that asks for the SA password on installation, much like most current Linux distros.
Or, hell, just whip up a script that'll "secure against intrusion" and sell that off for a few thousand bucks per unit. Higher the price the better
Re: (Score:1)
In my experience the SQL Admin is a bit of a developer, a bit of a sysadmin, and something all of their own. To hear that they where only ever data entry makes me shutter! I'm more comfortable with shifting from within IT than from the secretary pool.
Re: (Score:2)
Yet they had no clue what synonyms were... no clue how to solve table locking issues (a common SQL Server problem and one of its main flaws in the 2000 edition and before, but if you're going to go the SQL Server route, you need to know how to handle
Re: (Score:2)
Solving locking issues can be very tricky, especially since quite a lot DBMS o
Re: (Score:2)
Re: (Score:2)
Hinting a no lock will of course remove any issues, but asking it to remove the locks might not be a good idea, I would certainly have someones head removed if they decided to run without locks on my system.
And we do use explicit cursors, its fast and we get to choose what is dropped when.
About the horizontal scaling, you just made it sound like everything is a piece of
Re: (Score:2)
I have seen one (1) customer where the resident admin asked for an account to install the server-side piece of our software provided something else than "root", even when explicitely told not to. I don't think I need to describe the rest of the security at their places. I've learned that trying to tell them anything about the basic common sense rules is counterproductive, too. If I try, I and our company get labelled as "troublemakers" behind our backs. Even
Re: (Score:2)
It's cheap to try (Score:1)
pulling the worms out (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Most of mine lately are the windows RCP exploits and the exploit for old symantec overflows on port 2967. That, or I used to get a lot of traffic from SSH brute force attacks and malicious HTTP stuff...
Re:70% really? (Score:4, Informative)
Yup. One of the first bits I install on a new server is DenyHosts [sf.net]; "service denyhosts start" and an hour later there are a half dozen IPs in
Re: (Score:2)
The only reason I wasn't locked out is because I had an open SSH session currently in progress.
Re: (Score:2)
Yeah, that's a bad feeling. But the good thing is that you can usually ssh in from some other subnet. Unless you've already set up AllowHosts or something, in which case, yeah, a drive to the colo is in your near future
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
If someone writes a "zero day" worm, they are likely to stick to the default ports to maximize the spread speed. So that means I have more time to fix the affected service.
There are people who think obscurity isn't useful, and there are people who genuinely have more time to read Slashdot
Re: (Score:2)
Yeah, too much of those Latter Day Saints can really ruin your life.
Team 17 just made it too good (Score:4, Funny)
Re: (Score:2)
Thinking to myself, "Worms, what does worms have to do with an article about sql worms
I really need to take a nap after lunch, it appears.
Worms: 2 was the best... (Score:1)
maybe... (Score:1)
I can imagine a blank password due to struggling with ignorant users and bad application coding.
Re: (Score:1)
Why?? duuh (Score:2)
*rimshot*
Hmm, viable infection vectors still used... (Score:1)
Let's compare this to medical infection vectors. There is sexual, by touch, by air, by liquid/drink, or by food. I can't really think other disease transmission ways. We've got what millions of bacteria/viruses spreading by those means every second. As long as its still effective, it'll still be in use.
I think of net security sort of like keeping a eco system healthy and without
More disease vectors -- mostly OT (Score:2)
Parasitic infection (mosquito is carrier of malaria, mosquito bites you, etc)
Pathogen touches skin (thankfully, we're pretty robust against this, but it worths for some pathogens and for folks with weakened immune systems. You might be familiar with planter's warts, athlete's foot, etc.)
Pathogen enters through compromise in skin (nick finger, open floodgates)
etc, etc
Basically, all you need for an infection is to get a
Re: (Score:2)
Sometimes I'd want my immune system running my virtual security. It
Running an entire suite of old exploits (Score:2)
Umm....SQL? (Score:1, Offtopic)
OK, so SQL injection doesn't require the kind of in-depth knowledge to exploit that buffer overflows in C do, so I imagine SQL exploits might be easier to craft to begin with
Re: (Score:2)
I'm not sure that the quote is meaningful... (Score:2)