Hackers Find Home In Amazon EC2 Cloud 89
snydeq writes "Security researchers have spotted the Zeus botnet running an unauthorized command and control center on Amazon's EC2 cloud computing infrastructure. This marks the first time Amazon Web Services' cloud infrastructure has been used for this type of illegal activity, according to threat researcher Don DeBolt. The hackers got onto Amazon's infrastructure by hacking into a Web site hosted on Amazon's servers and then secretly installing their command and control infrastructure."
If anything... (Score:5, Funny)
Re: (Score:1)
*groan*
Re: (Score:1, Informative)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Well, it looks like I've been doing it wrong all this time. I've been trying to hack the cloud with an axe.
I just keep whiffing.
Re:If anything... (Score:4, Interesting)
Not really, as everyone knows you have hotmail and gmail accounts that have commands updated each week for certain other types of botnet, so is that to spark a debate about whether or not we should allow hotmail or gmail, certainly not, however, it could go to show there should be a better security implementation on the servers hosting the clouds to quickly locate any compromised machines or code on the servers.
And? (Score:5, Insightful)
Re: (Score:3, Insightful)
In fact the internet has been represented as a cloud long before cloud became a buzzword.
Re:And? (Score:4, Funny)
Wait a minute. I'm a manager, and I've been reading a lot of case studies and watching a lot of webcasts about The Cloud. Based on all of this glorious marketing literature, I, as a manager, have absolutely no reason to doubt the safety of any data put in The Cloud.
The case studies all use words like "secure", "MD5", "RSS feeds" and "encryption" to describe the security of The Cloud. I don't know about you, but that sounds damn secure to me! Some Clouds even use SSL and HTTP. That's rock solid in my book.
And don't forget that you have to use Web Services to access The Cloud. Nothing is more secure than SOA and Web Services, with the exception of perhaps SaaS. But I think that Cloud Services 2.0 will combine the tiers into an MVC-compliant stack that uses SaaS to increase the security and partitioning of the data.
My main concern isn't with the security of The Cloud, but rather with getting my Indian team to learn all about it so we can deploy some first-generation The Cloud applications and Web Services to provide the ultimate platform upon which we can layer our business intelligence and reporting, because there are still a few verticals that we need to leverage before we can move to The Cloud 2.0.
Re: (Score:3, Interesting)
Re:And? (Score:5, Informative)
Re: (Score:2)
I will use this verbatim at my next Technology Strategy meeting.
Re: (Score:2)
The Cloud applications and Web Services to provide the ultimate platform upon which we can layer our business intelligence and reporting, because there are still a few verticals that we need to leverage before we can move to The Cloud 2.0.
Bingo!
Re: (Score:3, Funny)
There we have it. Metrics never lie! Looks like you're on a one way trip to the executive suite!
You must be lost, sir. (Score:2)
I know you sign my performance reviews every year, but that doesn't mean you can invade my home like this.
Re: (Score:2)
Re: (Score:1)
It does little good to build an impenetrable vault and leave the door open all the time.
Nothing really special (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Interesting)
I think the "special" part of the news is that since its being hosted on the cloud its harder to remove - since it'll be running on multiple computers capable of replicating itself across multiple machines. In order to purge it, you'd probably have to take down the entire infected cloud and clean it all seperately or at least all in synch.
Re: (Score:2)
No, you just change your launch keys and kill the infected nodes, which can all be done in seconds.
Re: (Score:2)
If it were that easy - why hasn't it been fixed? They claim they've only discovered the botnet, not removed it.
Re: (Score:2, Informative)
According to the second article [ca.com], it has been fixed.
Re: (Score:2)
Or, more likely, just disable the affected virtual instances, and maybe all instances for the affected account (assuming that by violating the hosted instances security, t
Re: (Score:2)
Re: (Score:2)
With EC2, you'd bring up a new node based on the clean AMI, but with a security policy which allows only your IP to talk to it (this is the default). You'd fix the vulnerability and save that instance as a new AMI.
You'd launch new instances of the clean, fixed AMI. You'd shut down the old infected instances. Done. No downtime and a complete purge.
Most of your time would be spent fixing the vulnerability, the rest of it are just standard EC2 maintenance tasks that if you're moderately savvy in the cloud
Re: (Score:2)
Alternatively you can just terminate the instance. Far easier than disconnecting a physical machine.
Re: (Score:2)
But it does mean that Amazon can shut down the compromised instances. That's where the up's and down's come in. I'm happy if they shut someone else off. I get a big-brother feeling if they shut mine off. :)
WHAT???? (Score:3, Insightful)
Hosting in cloud doesn't automagically make your sites more secure.
You mean... I still have to have people who can "manage" my systems?
NOOOO!!!!
This type of illegal activity? (Score:5, Insightful)
So, has it been used for other illegal things that have been reported on? Is it even possible for anyone to find out all the possible illegal uses of technolgies like cloud computing?
The "Deniable" Already Happens! (Score:3, Insightful)
"This marks the first time Amazon Web Services' cloud infrastructure has been used for this type of illegal activity"
So, has it been used for other illegal things that have been reported on? Is it even possible for anyone to find out all the possible illegal uses of technolgies like cloud computing?
I'm willing to bet that folks like Apple, Google, Amazon, and Microsoft are already hiring "security consultants" to act as deniable intermediaries to other consultants using semi-legal (or flat-out illegal) means to gather information. Not only are arrangements like this being used for industrial espionage, but to gather intelligence on illegal operators who might hack into or otherwise subvert corporate resources like AWS or Google's cloud. This would just be an extension of what companies already do with
Re: (Score:2)
James Patterson
Yes. (Score:1)
Is it even possible for anyone to find out all the possible illegal uses of technolgies like cloud computing?
Yes. They're exactly the same as all the possible illegal uses of any other kind of computing.
Re: (Score:2)
Not within the cloud itself. Incompleteness and all that.
Yes, yes it is (Score:2)
Yes, it is possible. However, it is the same as trying to win a war against jealousy or envy.
Re: (Score:2)
Is it even possible for anyone to find out all the possible illegal uses of technolgies like cloud computing?
Yes, because it's exactly the same as regular computing.
Ready for prime time! (Score:5, Funny)
You know, if bot net operators are trusting the EC2 cloud for their mission critical operations, it has to be ready for prime time.
This is a stunning endorsement. Amazon should send out a press release.
Not Amazon that got hacked (Score:4, Informative)
Re: (Score:3, Informative)
According to the summary too: "The hackers got onto Amazon's infrastructure by hacking into a Web site hosted on Amazon's servers..."
No different than "a web site hosted on Rackspace's servers". I agree with the other posts that this is essentially a non-news item. So a server gets hacked. It doesn't matter that the server is in someone's basement or in a colo or a VM somewhere.
This is not new (Score:3, Informative)
If you search "Xbox Host booting" on YouTube, there are hundreds of videos showing you how to utilize the mass computing power of the cloud to knock your opponent off from a Halo 3 session and get the win.
I'm just pwning your server if that's ok... (Score:4, Funny)
When was the last time a criminal came up to your admin and said, "Hi, I'm going to install my unwanted rootkit on your server now so I can use it as a botnet."?
Yeah, it's like saying a burglar secretly robbed your house... Like he's really going to send you a postcard saying, "Tonight when you go to the movies, I'm going to pillage your apt.".
Re: (Score:2)
Re:I'm just pwning your server if that's ok... (Score:5, Funny)
When was the last time a criminal came up to your admin and said, "Hi, I'm going to install my unwanted rootkit on your server now so I can use it as a botnet."?
Yesterday. But since he wasn't asking a question, I couldn't say no. I advised him that his course of action was not one that I wished to occur and he politely informed me that it was "duly noted" and proceeded anyways. All in all, it was a nice verbal transaction and his posture was excellent, and I'm sure outside of his work he's a really nice guy. I wanted to ask him if he wanted to go for a couple of cold ones - but I think that might have been pushing it and didn't want to offend him.
To be honest, the thing that bugs me more than this backdoor to my machine is the regret that I never reached out to him more. A lost friendship, that will likely never have another chance at forming. Everytime that Antivirus XP pop-up comes on screen it reminds me of him. I've slowly come to realize that I am remembering him constantly, where he probably does not remember me at all. I shamefully admit that I cry myself to sleep, telling myself that one day he'll come back to me, and maybe out of remorse he'll remove the conficker and everything will be okay.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Thank you, and yes I do think of you, often..
Re: (Score:2)
What are you babbling about? Your post is unfunny and nonsensical to boot.
Just for you, AC, I will break it down.
The parent of the thread pointed out that the line "then secretly installing their command and control infrastructure" is a little silly because no hacker would ever do it NOT in secret. He then explains similar scenarios in why it would be ridiculous if someone did.
In my post I claim that someone in fact DID perform such a ridiculous action. However, since we're being ridiculous, I thought it would be funny to kick it up a notch and make MY REACTION even MORE ridiculo
Re: (Score:2)
I think yours may be the best Slashdot post ever!!!
the interesting thing is autoscaling and billing (Score:4, Interesting)
Re: (Score:2)
Used to inflate ratings? (Score:1)
thundercloud tag (Score:1, Offtopic)
Thundercloud... subs [thundercloud.com]?
-l
Brute Force ssh attacks from Amazon (Score:3, Interesting)
I posted to my blog back in June that Amazon cloud nodes were compromised and performing brute force SSH scans against some of my hosts.
This story and my post merely highlight the obvious fact that most cloud services are just scalable hosting. Remember your instance / slice / vm can be compromised like any other web host.
Amazon Cloud Service Brute Force Attacks [hackertarget.com]
This is new? (Score:2)
I'm (still) seeing penetration attempts (Score:2)
I'm seeing attempts to access a bunch of non-existent but suspicious files on my server (most recent at 12:32 EST today)
mydomain.com/
install.txt , cart, zencart, zen-cart, zen, shop, bulk, zcart, shop2, catalog, mobile, iphone, mobi, m, boutique, cart, store
None of these things exist on my server, and it -might be the case- that a legitimate web crawler would look for mobile web customizations in mobile, mobi, iphone or even m, the rest of these make absolutely no sense for anything ot
Re: (Score:1)
Re: (Score:1)
(There are some significant advantages to running a "dumb" webserver without ASP, PHP, JSP, etc :-)
I need to figure out a way to have a 'blacklist file', such that any attempt to access these files adds the requester to a blacklist.
Get a less dumb webserver?
Cloud bot (Score:2)
err wait...
Re: (Score:2)
You've lost that argument, you might as well give it up.
Also, ^W (delete word) not ^H^H^H^H^H^H^H.
Ummm.. did I miss the news portion of this? (Score:2)
Whai I got back from Amazon... (Score:2)
Hello from Amazon.com.
We're sorry to hear you've experienced issues with the malware/penetration attempts coming from Amazon cloud computing servers.
The symptoms you've reported are consistent with malicious software (malware), such as a virus or spyware, installed on your computer. If your computer has been infected with this type of software, it can replace images in the Amazon.com advertisement slots or generate pop-up ads with images that are not intentionally inserted by Amazon or our advertising partn