Last Updated: 2008-07-21 01:19:06 UTC
by Kevin Liston (Version: 2)
Steven over at Shadowserver is reporting on a Distributed Denial of Service attack against the website of President Mikhail Saakashvili of Georgia (www.president.gov.ge)
Check your logs for activity heading towards the target www.president.gov.ge (18.104.22.168) or the command and control server (22.214.171.124) which may indicate that you have compromised systems on your network.
UPDATE: Jose at ARBOR Networks has more one the actual political motivations behind the attack here: http://asert.arbornetworks.com/2008/07/georgia-on-my-mind-political-ddos/
Last Updated: 2008-07-20 18:52:34 UTC
by Kevin Liston (Version: 1)
At the day job I have to read a lot of alerts and reports and studies and white-papers and blogs on viruses, worms, malicious websites, crimeware, spyware, adware, malware (oh my.)
The intent is to tease out the important little details so that I can provide the proper guidance the client.
Anytime someone produces a document, they have a target audience in mind (although sometimes it feels like they’re not conscious of it.)
- IT Staff/Sysadmins/Operations
- Malware Researchers
- Are we vulnerable to this?
- Am I getting my money’s worth from what I’m spending on anti-malware measures?
- Are we exposed?
- If so, what do we do about it?
Are We Exposed?
The answer to this question relies on the answers to a number of other questions:
- What vulnerability does this exploit?
- Does our AV detect or block this?
What Do We Do About It?
This is really the meat of what Operations needs to know.
- Are there new AV signatures to deploy?
- Do Websites need to be blocked?
- Are there IDS signatures to detect infected systems?
- Can it be safely cleaned off of a system? Or does it need to be re-imaged?
Is Your Environment Perfect?
I don’t know about your network, but in mine, AV fails (malware generation is faster than signature deployment, AV isn’t installed everywhere,) Web proxy filters fail (malicious sites pop up faster than the filter DB gets deployed, people have laptops and don’t have this protection on the road,) and people click on things (especially before their morning cup of coffee.) So an additional question that the security operations group needs to have answered is: “How do we detect an infected/compromised machine?”
- Does it connect out to a known Command and Control system?
- Does it make known HTTP requests?
- Does it advertise itself in the user-agent?
- Does it scan for a particular port?
- Does it generate P2P traffic?
- Does it set up a backdoor listener?
Case Study: The SuperBowl Worm
In February 2007, I wrote up a simple little entry (http://isc.sans.org/diary.html?storyid=2151) on what was dubbed the ”SuperBowl” worm. It was a harbinger of things to come, warning of our current environment of widespread web-site defacements driving a victim to a malicious website.
With that article, I hope that helped to satisfy the important questions, namely:
- What vulnerability is exploited? MS06-014 and MS07-004
- What does it do your system? It attempts to install www.exe on the victim machine
- We provided links to IDS alerts
- We briefly mentioned AV coverage (my work left a lot to be desired in this instance.)
Now, for the back story. At the day job this was getting a lot of managerial attention—mainly of the “What are we doing about it?” variety. We had good information on how to identify a malicious website, and matching that against our web proxy logs, we had very good information on how many systems were exposed. What we were lacking was a good signature for a successful exploit. In this instance we chose with the “better safe than sorry approach” and opened up tickets on everyone who visited a malicious website. This sent a technician out to each machine to check that it was patched properly, the AV was running properly and re-image the system if anything was out of line.
We’ve adjusted our response process a bit, and now “remember the Superbowl” is often uttered when trying to temper down mid-incident excitement.
In this case, we could have waited a bit to generate a better list of infected machines—especially with the hindsight that the malware’s intent was to steal gaming passwords—not targeting all passwords.
Case Study: Coreflood
In June 2008, Deb mentions a Coreflood outbreak (http://isc.sans.org/diary.html?storyid=4624) She mentions that the malware was delivered via a malicious website and goes on to describe how it uses psexec and domain privileges to infect other machines in the domain. There’s also a note of how McAfee and Norton are detecting it. Not too bad, but keep in mind that we’re not claiming to be your one-stop malware intelligence source.
It has a few more answers in it. I can’t answer all of the basic questions yet, but I can make some assumptions. Of importance is the statement: “At current, the known controller domains are mcupdate.net, joy4host.com and antrexhost.com.” This is something that I can use, I can detect infected systems within our network and respond. Happily I’m able to report that we haven’t found any (yet) at the day job.
Case Study: W32/Agent-FUVR
I received a query this week about an outbreak in Indonesia of W32/Agent-FUVR. It was along the lines of: “A Customer is concerned about W32/Agent-FUVR and wants to know what we’re doing about it.”
Initially, I had to ask myself: “What is W32/Agent-FUVR?” I had to google it. Hoping that I’d find a virustotal result that would translate W32/Agent-FUVR into what other AV tools were identifying it as. From the results (and making some possibly dangerous assumptions) I see that
The provided copy/paste of the news article says that it’s targeting
Using the virustotal results as a kind of Rosetta stone to translate W32/Agent-FUVR into what the client’s AV vendor calls it, reveals only a generic signature. The good news is that I can tell the client that they’ve had coverage for this since at least June 15th (based on when the virustotal report was created.) So I can tell them that they’re (reasonably) covered from an AV signature standpoint.
I still couldn’t tell you what the intent of the malware is at this point—nor do I have a good signature to detect if an infected machine was brought into their environment. But it’s not a perfect world, and you don’t win them all.
The Ignored Target Audience
What I rarely see are efforts to identify the individuals and groups behind the malware that we deal with. Obviously such investigations need to be kept quiet, but one would hope that there would be more reports of arrests, or we wouldn’t have bot-nets that have been in the media spotlight for long periods of time. If you have information that would help such an investigation, but don’t know who to report it to or how, please contact us.
The Ideal Intelligence Source
- What vulnerability the malware exploits
- What the malware does to the system
- What the malware’s intent is
- Who is behind it
A source that provides all of that information would be able to answer nearly all of the relevant questions that Operations, Management, and Law Enforcement have. Malware Researchers: I’m afraid that you’re on your own. It’s up to you in your labs with your debuggers digging into it yourselves. I’m fairly certain that you wouldn’t have it any other way.