Mass Website Hack Compromises 200,000 Sites 153
Stony Stevenson writes "Hot on the heels of a recent hack in which 10,000 sites were compromised, researchers have disclosed a new large-scale attack. Researchers at McAfee estimated that the attack has been active for roughly one week, and in that time frame has managed to place itself on roughly 200,000 web pages. Most of the infected pages are running the phpBB forum software, said McAfee. The compromised pages are embedded with a Javascript file that links to the site hosting the attack."
Please be more forthcoming (Score:5, Insightful)
Here too, we have a threat which is already running wild. Thousands of websites are being attacked. Unfortunately, this article, like many which abound in the security theatre online media, is long on consequences and short on details. Someone knows how the attack spreads, but they aren't sharing the means of stopping the attack.
This article and its lack of content does as much to spread fear and chaos among computer users as the actual attack. These are technical problems which can be fixed. By not being clear about the threat, the article turns hackers into bogeymen that can't be stopped. Give some better info, tell us how to close the hole, and let us get back to work.
Re:Please be more forthcoming (Score:5, Insightful)
Oh they'll have an answer for that -- just buy McAfee's "protection".
Remember- your Mac is spreading viruses, even if it's not infected.... Be ashamed!
Re: (Score:2)
The bigger problem is people installing the "codec" on their computers to watch the porn video. Isn't there enough porn available for free that you can watch already?
Companies that fail to filter out downloadable executab
Re: (Score:2)
Re: (Score:1, Offtopic)
Re: (Score:3, Funny)
Ewww. Too much information.
Internet-connection license? (Score:1)
How about this plan: anybody, who wishes to maintain an Internet-reachable computer, needs to be licensed (or hire someone, who is). I mean, we require licenses and/or permits to alter plumbing in a house or to add a porch — aren't botnets [usatoday.com] more threatening to the country, than an improperly placed pipe here and there?
Since most attacks originate from abroad, we could relax the rule by applying it only to those, who wish to be reachable from outside US (rather than be automatically firewalled by thei
Re: (Score:2)
Re: (Score:2)
No, it would be people, who would be licensed, not the operating systems (which are hard to define anyway: Linux vs. Ubuntu?)
Much like plumbers and electricians...
Re:Internet-connection license? (Score:5, Informative)
Re: (Score:2)
I'd tend to agree, actually. But, I think, it is inconsistent to require licensing for driving a car and not require it for Internet connection. There will soon be time, when a hacker will be responsible for a death — if it has not happened already...
A botnet targeting a 911 server or a utility company, or a swatting [wikipedia.org] gone really wrong...
In many cases, the hackers are using other people's PCs without their knowledge — a clueless person making their PC reachable from the Internet is about as d
Re: (Score:2)
In many cases, the hackers are using other people's PCs without their knowledge -- a clueless person making their PC reachable from the Internet is about as dangerous as an unlicensed driver on the highway...
Please post even a single reference to an actual death or injury that could have been prevented by licensing internet access.
What we need to do is spend less money confiscating water bottles and more detecting and prosecuting people exploiting PCs.
Re: (Score:2)
They tend to be based abroad, and the CIA's drones can only blast so many per month...
Re: (Score:2)
They tend to be based abroad, and the CIA's drones can only blast so many per month...
A "please secure your %*^%*& server" from the FBI might get some action on the U.S. side without nearly the overhead of licensing.
Re: (Score:2)
Re: (Score:2)
No, you completely misread my proposal. I don't know, how to express it any clearer, so I'll just try again, with emphasis:
There. Accessing web-sites is Ok. But if you want your ISP to allow any connection initiated from the outside to reach your computer, a person licensed in
Re: (Score:2)
Yeah, that'll be great! The license fees and insurance costs will inch up until only a corporate sponsored person can afford it and web 2.0 can become boob-tube 2.0
The telecom and media industries LOVE barriers to entry because they can lobby to raise them just high enough to keep potential competition away.
Re: (Score:2)
Yeah, it really sucks, that regular people can not drive their own cars any more, and are forced to take big corporation-owned buses, does not it?
Re: (Score:2)
Yeah, it really sucks, that regular people can not drive their own cars any more, and are forced to take big corporation-owned buses, does not it?
If the bus and taxi lobby were as big as telecom, that would be exactly the case. Also keep in mind that there are way too many registered voters who want to drive but not so many that want to run a server.
Re: (Score:2, Informative)
For a properly maintained phpBB site, this isn't that big of a deal. As a maintainer for a site which uses phpBB, I can tell you that I have seen this attempted for months. I believe phpBB is mentioned directly because it seems there are programs which allow individuals to create forum accounts and post messages using an automated script. The scripts post messages to visit a (usually) pornographic site. Once you connect you are presented with a page with a display which mimics YouTube.com, however a pop
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
Unfortunately, this article, like many which abound in the security theatre online media, is long on consequences and short on details. Someone knows how the attack spreads, but they aren't sharing the means of stopping the attack.
I always thought the news were to report news, and that the knowledge itself was stored somewhere else.
I'd like to report another case then. Last week I read news about a new book, and the book was not printed in the papers. Actually, the news didn't even tell me where to buy the book.
Re: (Score:2, Informative)
Here too, we have a threat which is already running wild. Thousands of websites are being attacked. Unfortunately, this article, like many which abound in the security theatre online media, is long on consequences and short on details. Someone knows how the attack spreads, but they aren't sharing the means of stopping the attack.
We know exactly how it spreads: php. Don't get me wrong, php is a good language as of 5.x. However, to write something in it that's not simple to exploit you actually have to know what you're doing, which is not the case the for majority of php developers. Look at the majority of php code out there, it's no surprise at all why it's so security plagued: the developers simply have no clue and php doesn't protect you. Hell, even many tutorials out there have security exploits in them.
If you absolutely hav
Re: (Score:2)
Do you want more posts that start like this, "This reminds me of George Bush's environmental policy..."
Moderation is supposed to stop that sort of thing. Instead he's +5.
Re: (Score:2, Informative)
I haven't heard of any glaring security issues with phpBB before or
Good news for us, I guess... (Score:4, Insightful)
Am I completely off-base here?
Re: (Score:3, Insightful)
Re:Good news for us, I guess... (Score:4, Insightful)
I do not believe anyone really knows what market share the various forums have, but it is generally believed that the most popular are Simple Machines, phpBB, vBulletin, and Invision Power Board (in no particular order).
I cannot believe that phpBB has so many successful attacks simply because it has a large installation base, otherwise these other forum softwares would also be suffering the same fate.
Re: (Score:2, Informative)
Fscking idiots. I still use it. But I've done extensive custom patching to make it (relatively) safe. The project maintainers just can't be bothered to listen to criticism and get sma
Re:Good news for us, I guess... (Score:5, Insightful)
Re:Good news for us, I guess... (Score:5, Funny)
Perhaps they should rename it to PenguinBB so that hackers ignore it. Better yet, EmacsBB (or does it already have one builtin?)
Re: (Score:1)
It sure has [gnus.org]! Though only a client, not an actual message board server. Which shouldn't be too difficult to implement, of course, if one were inclined.
Re:Good news for us, I guess... (Score:5, Insightful)
Except that popularity != exploitability. Many people think that software is like a safe - if you grind at it long enough, eventually it'll open. Software isn't like that. You can grind at software forever and it won't change anything unless you actually find a vulnerability - a case not handled by the software.
For example, MySQL is much more popular online than Microsoft SQL. Yet MS-SQL gave rise to the slammer worm [google.com] while the vastly-more-commonly-installed MySQL has not ever been infected by anything anywhere near the same magnitude. (Yes, there have been a few. They didn't get very far)
The formula is NOT:
Popularity = Exploited.
It's more like
Popularity * Bad Design = Exploited.
And even bad software can eventually be cleaned up. Sendmail used to be a security nightmare. But despite its position as the #1 mail server software on the Internet, it's been quite a few years since any serious vulns were exploited.
Re: (Score:2, Informative)
It's the same reason hackers devote so much time exploiting Windows - more bang for your buck. phpBB is everywhere.
It's not so much that as it is the fact that phpBB 1.x/2.x have a appalling number of security flaws. It's wildly insecure, so much so that there's actually a mod (crackertracker) designed to help harden installations against the inevitable attacks.
I'd be willing to bet that most of the phpBB installs were 1.x/2.x -- the phpBB team actually paid for an audit of the 3.x line, and so far it seems to be much more secure code.
Re: (Score:2)
Because of this even a minor upgrade is about a days work whilst everything is re-applied and retested. It's hell if you have any custom themes - because you have to basically recreate it from scratch because again the themes are hooked into the core code and themes for one versio
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
why this happens (Score:5, Interesting)
Re: (Score:1)
Re: (Score:2)
Then again, I just had to fix my vista machine from the endless reboot of death. ^ ^
Re: (Score:2)
Re: (Score:2)
Re:why this happens (Score:4, Insightful)
Well, (Score:5, Funny)
Re: (Score:2, Funny)
Re: (Score:3, Funny)
Must be a special offer from Pen Island.
Why is it always porn? (Score:3, Insightful)
Re:Why is it always porn? (Score:5, Funny)
Re: (Score:2)
Re: (Score:1)
'social engineering' (Score:1)
There *is* a mention of an exploit on ASP machines.
Re: (Score:2, Interesting)
Re:'social engineering' (Score:5, Funny)
Re: (Score:2)
Re: (Score:1)
Not really an exploit? (Score:1)
I'm a little confused here - how can it be "social engineering" when the javascript required to create the porn/codec popup had to be inserted somehow?
Uh So Like... (Score:1)
Hi mom!
This is not the NSA. (Score:1, Troll)
NARC!!! (Score:1)
Language is a Virus (Score:5, Insightful)
Pages, not sites (Score:5, Informative)
According to this video [avertlabs.com], the pages are being inserted via SQL injection attacks. The 200k pages is based on a google search (he does not reveal what criteria he is searching for) which came back with 150k hits. So it is not clear how many actual sites are compromised. One could assume that once a phpBB site is compromised, every page of every thread, which is analogous to individual web pages, would redirect to the worm download site. A popular forum could easily have several thousand thread-pages. In fact, every single page would probably be redirecting, which would include each user's summary page (which would be in the thousands for even a small site). So a small number of cites could be accounting for all the 200k pages.
Also, in the video it is clear from the url that it is a phpBB2 site that is compromised. phpBB is currently at a major version of 3.
The attack modifies the forum title (Score:5, Interesting)
When this news broke last night (my local time), my heart skipped a beat because one of my phpBB instances isn't totally up to date, so I did a quick bit of research to see if I could fill in the massive blanks left by this report. Yes, it does look like an SQL injection attack: the attack appends a SCRIPT tag to the forum's main title, which is inserted into various locations on every page from a database field. Due to one thing and another this results in some hideously malformed HTML, but it has the desired effect (of executing the Javascript) in the major browsers. I suspect that the search in question is a Google "intitle:" search which keys off the domain name of the site carrying the exploit code, since this becomes a visible part of the title.
I have no idea exactly how the SQL injection is being effected, but my phpBB forum was not impacted. This may be because my version is not too old, because I lack a vulnerable add-on module, or because my custom anti-bot mechanisms deflected the attack. I couldn't see anything in the past few days of log activity which contained key strings used in the exploit, but I didn't search very hard once I determined that my instance was unaffected.
Re: (Score:2)
How many vulnerabilities would be eliminated if web applications (a) produced valid HTML and (b) validated each page of output before sending it to the browser?
If you think that's too slow, then the validation could be done asynchronously and if a script starts generating invalid pages then it could be temporarily disabled while the administrator inves
I'm running phpBB (Score:5, Interesting)
But I've made some modifications to my install. I replaced the registration and profile pages with a web form that posts to an Email parser. There was a lot of activity the last few days, spam registrations out the yang.
It's funny because to them it looks like the registration page and they keep running scripts against it. I block the IP ranges of the spam registrations at the boundary but they just keep block hopping.
They'll still get a script reg through sometimes, so there's something I'm missing. I could just install the security updates but it's so much more fun to try and tweak it myself.
Re: (Score:1)
Re: (Score:2, Insightful)
200,000 Sites Hacked (Score:4, Funny)
Re: (Score:3, Informative)
Re: (Score:2)
Upgrade to phpBB3 (Score:2)
Re: (Score:1)
But most people don't know better... (Score:1, Insightful)
The problem here is most of the people using this software has limited HTML/Web programming skills and find these as easy solutions to what they want, a site for their MMO Clan, their band, etc.
These packages are not only presented as free and easy, but safe
Re: (Score:1)
Re:But most people don't know better... (Score:4, Informative)
First, I'm not sure if your talking ASP or ASP.Net, but either way the vast majority of your comment can be shortened to:
There are lots of PHP packages out there. People think they are safe because they are not MS. PHP packages should be re-written in ASP. PHP breaks due to updates but ASP updates better, therefore ASP is a better choice. PHP isn't inherently insecure, it's the packages.
Your entire statement boils down to this logic:
1) There are a lot of insecure Packages in PHP
3) It's not an insecurity in PHP, it's an insecurity in the packages
2) ASP updates better than PHP
Your comparing apples (ASP) to oranges (PHP Packages). I have no experience how well or poorly the security of packages in PHP perform against the security of packages in ASP.Net, we would have to pick a large pool of them to find out. And just because Windows Updates makes updates available for ASP.Net does not mean that people actually are that willing to reboot their web farms for every update that appears. Your saying the problem is bad coding and that ASP solves it, I would beg to differ.
And here is my anecdotal comment:
I have answered thousands of ASP questions (ASP used to be my primary web 'language') as well as written/re-written many sites and over time I have seen a lot of site examples and snippets that would leave a page wide open or in a position to break on regular occasions (or just plain didn't work). On the other hand I have worked with several PHP packages that were solidly put together and worked against a range of PHP versions. PHP must be better because I haven't personally seen anywhere near as many errors in coding as I have in ASP. None of the first several thousand ASP posts would work at all against the next version of the language (ASP 3 => ASP.Net) and needed to be rewritten from scratch, but most or all of the packages I used with PHP 4 worked just fine with PHP 5.
Re: (Score:2)
ppl r stoop1d. (Score:2, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2)
No offense, but this isn't 1337. This is a script kiddie attack.
Now, if someone with real "1337" skills did an attack, we would only find out years after the fact, if ever, and they would have gotten away with a fair sum of cash too.
Making Open Source a harder sell (Score:4, Insightful)
Yeah yeah, I know I'll be marked as troll/flamebait or whatever... but I don't see any upmodded discussion of this, it's a serious issue, if only for the perception it fosters in the industry.
Re: (Score:1)
Re: (Score:2)
I'm a big FLOSS advocate, but seriously I see so many people on places like slashdot saying "run FLOSS because it's more secure than proprietary software." I don't see huge headlines about vBulletin getting hundreds of thousands of breakins, even though "powered by vbulletin" gets three millions hits.
I'd argue th
The twist (Score:5, Funny)
For a second, you think that humanity may not be the mass of morons you thought. That patching the bug will let you access the real, intelligent, acute comments of human forums.
Then, as the patch starts to work, you see those comments; the beauty of human forums brings a tear to your eye. As you start posting, you feel unable to write, your keyboard doesn't seem to work.
You then understand you were just another spam generator, and the patch is killing you.
Fade to black.
yeah, I find stuff like this in my logs (Score:3, Informative)
Security hole actually in Fully Modded phpBB (Score:2, Informative)
The Fully Modded phpBB [phpbbfm.net] website is down, but it is basically a fork or extension of the base phpBB code, which remains secure.
I know I've labored the point about phpBB not being vulnerable to this kind of attack, but it really is built from the ground up for security. This exploit does not affect phpBB, just the heavily modified for "Fully Modded phpBB".
Re: (Score:2, Interesting)
Re: (Score:2)
Yeah, I installed it way back in the days and forgot it was on my website. I have now gotten several emails from my domain host stating attacks on it using an exploit in phpBB.
Which is why you're supposed to upgrade. The article is incredibly short and doesn't specify, but I'd be willing to bet the exploit was one that has already been patched/revealed.
At least with this attack the computer savvy not running NoScript or the like will be able to avoid getting hit with the payload. And now, time to check to make sure my ASP pages haven't been attacked...
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2, Informative)
Re: (Score:2)
Re: (Score:1)
At least I think that's what it does - I've never actually used it, as the cable modem is outside my hardware firewall anyway.
Re: (Score:1)
Mind you it does take all of 20 seconds to have your network grab you an IP address...verify your computer...and finally connect. B
Re: (Score:2)
Mind you it does take all of 20 seconds to have your network grab you an IP address...verify your computer...and finally connect.
20 seconds?!? Who's got that kind of time? I'll be old by then!
Re: (Score:2)
Re: (Score:1)
It's usually located on the top, if it's a Motorola.