Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
IT Technology

Syntax Errors Are the Doom of Us All, Including Botnet Authors (arstechnica.com) 32

An anonymous reader shares a report: KmsdBot, a cryptomining botnet that could also be used for denial-of-service (DDOS) attacks, broke into systems through weak secure shell credentials. It could remotely control a system, it was hard to reverse-engineer, didn't stay persistent, and could target multiple architectures. KmsdBot was a complex malware with no easy fix. That was the case until researchers at Akamai Security Research witnessed a novel solution: forgetting to put a space between an IP address and a port in a command. And it came from whoever was controlling the botnet.

With no error-checking built in, sending KmsdBot a malformed command -- like its controllers did one day while Akamai was watching -- created a panic crash with an "index out of range" error. Because there's no persistence, the bot stays down, and malicious agents would need to reinfect a machine and rebuild the bot's functions. It is, as Akamai notes, "a nice story" and "a strong example of the fickle nature of technology." KmsdBot is an intriguing modern malware. It's written in Golang, partly because Golang is difficult to reverse-engineer. When Akamai's honeypot caught the malware, it defaulted to targeting a company that created private Grand Theft Auto Online servers. It has a cryptomining ability, though it was latent while the DDOS activity was running. At times, it wanted to attack other security companies or luxury car brands.

This discussion has been archived. No new comments can be posted.

Syntax Errors Are the Doom of Us All, Including Botnet Authors

Comments Filter:
  • Nonsence, I maik tieping errs all thu tiem, and nevur got fieard.

  • AI - designed malware will be a real game-changer.

  • FTA:

    Larry Cashdollar, principal security intelligence response engineer at Akamai, told DarkReading that almost all KmsdBot activity his firm was tracking has ceased, though the authors may be trying to reinfect systems again.

    Is that truly his name?

  • I'm l337! I don't need no stinking error checking.

    • since when is missing a space in a terminal command a "syntax error"

      since never
      • by kmoser ( 1469707 )
        If the software expects no space and your input contains a space, then by definition your input has a "syntax error." For example if instead of typing "ls" you type "l s", then you have made a syntax error.
  • by MobyDisk ( 75490 ) on Tuesday December 06, 2022 @12:47PM (#63107972) Homepage
    I have had 2 instances of being saved from a hack by a syntax error:

    I setup my first Linux box around Y2K so that my roommates could share a single internet connection. It sat unmodified for almost a year before we noticed that we couldn't SSH into it. When we connected a monitor we saw that the SSH service failed due to a syntax error in the configuration file. It turns out that a hacker had installed a rootkit, but their script changed the SSH config file in a way that wasn't supported by the version of SSH we had. So SSH failed to start and everyone, including the hacker, was locked out of the box. But ipchains continued to work so nobody noticed.

    In another case, I wrote my own HTTP server that ran on Windows 98/ME. It supported a cgi-bin gateway [wikipedia.org] and I had a script for a web counter [wikipedia.org]. I had a web counter that was written in PERL, intended for Linux, but I made it work on Windows. The web counter had an admin tool that I should not have put in the cgi-bin folder, because otherwise someone can run the admin script remotely. So of course, someone did. The admin tool had a vulnerability that let you run arbitrary commands. :-( So a hacker scanned my site, ran the admin tool, and used it to deface the web site. But they couldn't go any further because nobody in their right senses would expect a cgi-bin gateway running PERL on Windows '98. The bastardized configuration meant the command-shell was slightly different from what the expected, so the scripts didn't work.

    The lesson here is that overcomplicated, bastardized, customized, niche software is the key to security!

    • The lesson here is that overcomplicated, bastardized, customized, niche software is the key to security!

      Having such software likely increases the attack surface and will be a bonanza for skilled attackers. However, low-skill mischief makers ("Script kiddies" might be too nice of a term) will quickly move on to targets for which they can find pre-built exploits that will work unmodified.

      Also, I should point out that you've been hacked twice that you know about or at leas twice. Maybe more.

  • Write it all in one language (my choice would be C). Do it the same way every time and there'll be fewer mistakers.

You know you've landed gear-up when it takes full power to taxi.

Working...