Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New Hacking Tool Hijacks File-Sharing Networks
New Scientist ^ | March 19, 2004 | Mikko Hypponen

Posted on 03/21/2004 4:34:41 PM PST by LaserLock

Computer hackers have started using peer-to-peer networks to remotely take over hoards of "zombie" computers, adding yet more malicious capability to the hackers' tool-kit.

Network administrators at universities from Europe to the US recently detected the tool, a worm called Phatbot, on their machines. Phatbot is currently under analysis by the US Department of Homeland Security, in conjunction with a group of security analysts.

They say that Phatbot represents a new way for hackers to send spam and launch denial of service attacks that bring down websites by flooding them with traffic.

However, although the worm has infected millions of computers, it is not clear whether it has yet been used for these malicious purposes.

"We know that the functionality is out there - but we have no idea of knowing if it is already being used to launch attacks or send spam," says Joe Stewart of computer security services provider LURHQ in Chicago.

Virtual assembly point

LURHQ has posted an analysis of Phatbot's capabilities online. Like most stealthy computer worms, it is a piece of malicious, executable computer code posing as an innocuous program, called a Trojan Horse. It invades a computer through a security flaw in Microsoft Windows.

Once it has successfully infected a computer, it disables security programs such as firewalls and anti-virus software, scours the hard drive for email addresses that it can use for spamming and attempts to spread itself to new computers.

It also opens "backdoors" in the operating system that turn the computer into a zombie controlled remotely by the virus writer. For virus writers to issue orders to these infected computers, they need a virtual assembly point where they can talk to all the computers at once. So far the most common assembly point has been an internet chat room. "It's the logical extension of where these people already hang out," says Stewart.

Harder to shutdown

But Phatbot's victims are instead remotely controlled via a peer-to-peer (P2P) network - the same technology used by controversial file-sharing websites like Kazaa. "The only thing that attracted my attention to Phatbot is that the author is using peer-to-peer rather than Internet Relay Chat programs," explains Stewart.

This new mode of command is not necessarily more dangerous, but it could make these zombie networks more resilient. "It's not really that much more insidious but it is harder to have it shutdown, as on a peer-to-peer network there is no central point of control," says Stewart.

Mikko Hypponen, director of F-Secure, an antivirus software company based in Finland agrees. He told The Washington Post newspaper: "With these P2P Trojan networks, even if you take down half of the affected machines, the rest of the network continues to work just fine."


TOPICS: Miscellaneous; Technical
KEYWORDS: computersecurity
Navigation: use the links below to view more comments.
first 1-2021-34 next last

1 posted on 03/21/2004 4:34:41 PM PST by LaserLock
[ Post Reply | Private Reply | View Replies]

To: LaserLock
You know? I am getting SICK & TIRED of hearing the same stupid ignorant canned phrases from the "news media".

This article contains one of the favorites for the "hate-capitalist-freedoms" leftists radicals of the press:

"It invades a computer through a security flaw in Microsoft Windows"

People ... there is NO program made by any human that is 100% uncrackable!

Apple, if it were worth the trouble and expense, would have been #1 and it would have been replete with "security flaws".

I used to love breaking into UNIX machines with simple ascii commands in my "heydays"

LINUX is not much different! Many banking institutions run on Linux servers - do you REALLY want to know how many "cracks" there are for Linux? And to think, your bank is probably running on it.

I am NOT faulting any system - just those who mindlessly parrot the blabberings of even more ignorant leftist propagandists.
2 posted on 03/21/2004 5:01:12 PM PST by steplock (http://www.gohotsprings.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LaserLock
You know? I am getting SICK & TIRED of hearing the same stupid ignorant canned phrases from the "news media".

This article contains one of the favorites for the "hate-capitalist-freedoms" leftists radicals of the press:

"It invades a computer through a security flaw in Microsoft Windows"

People ... there is NO program made by any human that is 100% uncrackable!

Apple, if it were worth the trouble and expense, would have been #1 and it would have been replete with "security flaws".

I used to love breaking into UNIX machines with simple ascii commands in my "heydays"

LINUX is not much different! Many banking institutions run on Linux servers - do you REALLY want to know how many "cracks" there are for Linux? And to think, your bank is probably running on it.

I am NOT faulting any system - just those who mindlessly parrot the blabberings of even more ignorant leftist propagandists.
3 posted on 03/21/2004 5:02:14 PM PST by steplock (http://www.gohotsprings.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: steplock
AARRGH!!! Sorry about the double post. Like I said above, there is NO human capable of being perfect!

4 posted on 03/21/2004 5:03:11 PM PST by steplock (http://www.gohotsprings.com)
[ Post Reply | Private Reply | To 3 | View Replies]

To: steplock
"LINUX is not much different!"

Not true. You set up Linux correctly and nothing you download can execute without you allowing it to. You need to specifcally change the priveledges to execute a downloaded program or anyything. So viruses just sit, do no harm.

Linux has even more security levels if you want to apply them.

No software is flaw free. But viruses and flaws are not the same.

5 posted on 03/21/2004 5:07:34 PM PST by snooker (Drag a 'botox gigolo' through a swamp, and some dumb gator will always bite.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: LaserLock
So, what do you look for to know if you're infected?
6 posted on 03/21/2004 5:11:13 PM PST by decimon
[ Post Reply | Private Reply | To 1 | View Replies]

To: decimon
Oozing, pus filles sores, a burning sensation.....






nevermind.
7 posted on 03/21/2004 5:29:16 PM PST by NY.SS-Bar9
[ Post Reply | Private Reply | To 6 | View Replies]

To: snooker
Right - LINUX IS SAFE --- Think again!

News Security


Report: Linux hack attacks on the rise

Mi2g has evidence of 7,630 successful attacks on Linux systems in the first six months of this year, sharply up from last year's 5,736 attacks. In the meantime, successful attacks on Windows systems running Microsoft's Internet Information Server have fallen by 20 percent from 11,828 in the first half of 2001 to 9,404 in the first half of this year.

THis particular report is not new, but I do not wish to post the specific data on the linux bank (as in money!) hacks

8 posted on 03/21/2004 5:29:59 PM PST by steplock (http://www.gohotsprings.com)
[ Post Reply | Private Reply | To 5 | View Replies]

To: steplock
you show your complete ignorance of computers, linux is many times more secure than windows
9 posted on 03/21/2004 5:30:49 PM PST by tjblair
[ Post Reply | Private Reply | To 3 | View Replies]

To: steplock
AARRGH!!! Sorry about the double post. Like I said above, there is NO human capable of being perfect!

It must have happened because of a security/Posting flaw in Microsoft Windows.

<); )~

10 posted on 03/21/2004 5:37:02 PM PST by Caipirabob (Democrats.. Socialists..Commies..Traitors...Who can tell the difference?)
[ Post Reply | Private Reply | To 4 | View Replies]

To: steplock
Agreed.

But is it

REALLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLY

SOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO

NECESSSSSSSSSSSSSARYYYYYYYYYYYYYYYYYY

FOR MICROSOFT

to TRY SOOOOOOOOOOOOOOOOOOOOOOOOOOOO
HARD

AND SOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO

PERSISTENTLY

to be about as insecure as possible

AT OUR EXPENSE?????????????????????

WITH FARRRRRRRRRRRRRRRRRRRRRRRRRRRR

TOOOOOOOO LITTLE HELP FROM THEM TO
COMBAT SUCH IDIOCY?
11 posted on 03/21/2004 5:58:38 PM PST by Quix (Choose this day whom U will serve: Shrillery & demonic goons or The King of Kings and Lord of Lords)
[ Post Reply | Private Reply | To 4 | View Replies]

To: steplock
"mi2g noted that the numbers exclude attacks caused by viruses, worms and Trojan Horses."

No wonder Windows looks sooooooo much safer!

12 posted on 03/21/2004 6:05:15 PM PST by TechJunkYard
[ Post Reply | Private Reply | To 8 | View Replies]

To: snooker
"You need to specifcally change the priveledges to execute a downloaded program or anyything."

Duz linux have a gud spel cheker?

13 posted on 03/21/2004 6:09:24 PM PST by boris (The deadliest Weapon of Mass Destruction in History is a Leftist With a Word Processor)
[ Post Reply | Private Reply | To 5 | View Replies]

To: NY.SS-Bar9
Think my stash of "Potassium Penicillin" from 1967 would still work?
14 posted on 03/21/2004 6:20:25 PM PST by decimon
[ Post Reply | Private Reply | To 7 | View Replies]

To: steplock
This article contains one of the favorites for the "hate-capitalist-freedoms" leftists radicals of the press:
"It invades a computer through a security flaw in Microsoft Windows"
People ... there is NO program made by any human that is 100% uncrackable!
Phatbot scans for systems that have unpatched Windows vulnerabilities, including DCOM, DCOM2, locator service, network shares using weak passwords, WebDav, and the Windows Workstation Service. It will also attack systems already infected with the MyDoom worm.

Looks like the statement is correct, regardless of how you feel about it.

15 posted on 03/21/2004 6:27:42 PM PST by TechJunkYard
[ Post Reply | Private Reply | To 2 | View Replies]

To: TechJunkYard
Which is why it's so important to have a properly configured hardware firewall in place.

A properly configured firewall doesn't just limit incoming datagrams. It also limits what goes out. So if you do have an "infected" system, it's reported to the network administrator.

Mark
16 posted on 03/21/2004 6:36:51 PM PST by MarkL (The meek shall inherit the earth... But usually in plots 6' x 3' x 6' deep...)
[ Post Reply | Private Reply | To 15 | View Replies]

To: MarkL
Which is why it's so important to have a properly configured hardware firewall in place.

But only as long as you can trust the firewall software/firmware.

Guess how many hardware firewalls use Microsoft software. Guess how many use Linux.

17 posted on 03/21/2004 6:52:53 PM PST by TechJunkYard
[ Post Reply | Private Reply | To 16 | View Replies]

To: TechJunkYard
So you think that all these viruses (virii?) are all the fault of Microsoft?

You must be a lawyer then, or just another "victim" according the the leftist nanny-staters that demands ZERO defects in anything and everything so no one has to take responsibility for themselves.

Are you one of those "Hey My brakes went bad at ONLY 100,000 miles of mountain driving! SUE the bastards!" ?? Are you one of those who are demanding an auto recall costing 100's of millions of $$$ to replace a windshield wiper motor that has connection failures after ONLY 100,000 miles? Ever hear of vibration failure? I'm sure you would be the first in line with your 10 year old car demanding satisfaction because it had the audacity to wear out!

The American Capitalist Free-Enterpise system gives YOU the power and the responsibility. If you don't like a product, don't buy it. If there are no buyers, then the seller has to change or go broke.

Who forced you to buy Microsoft?


My entire point is - there IS NO 100% ZERO-TOLERANCE DEFECT FREE PRODUCT ANYWHERE created by man.

18 posted on 03/21/2004 7:27:23 PM PST by steplock (http://www.gohotsprings.com)
[ Post Reply | Private Reply | To 15 | View Replies]

To: steplock
My entire point is - there IS NO 100% ZERO-TOLERANCE DEFECT FREE PRODUCT ANYWHERE created by man.

I have done you the favor of posting your key sentence a fourth time. Can we assume that everyone has seen it now, so you don't have to post it again?

19 posted on 03/21/2004 7:36:52 PM PST by Nick Danger (Give me immortality... or give me death.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: TechJunkYard
Guess how many hardware firewalls use Microsoft software. Guess how many use Linux.

Read what I wrote... I specifically wrote hardware firewall.

Sure, there are a lot of firewalls that use versions of linux or bsd... Personally, I prefer IOS based firewalls, like PIX, or in a Novell environment, BorderManager. Although there have been a few security issues in PIX over the years, it's pretty solid, and when ever a vulnerability has been found, Cisco fixes it very quickly. Same with Novell. Very responsive to security flaws and exploits.

Mark

20 posted on 03/21/2004 8:10:12 PM PST by MarkL (The meek shall inherit the earth... But usually in plots 6' x 3' x 6' deep...)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-34 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson