Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Bagle Trojan Attack Strikes, Multiple Versions Overwhelm AV Defenses
TechWeb ^ | March 01, 2005 | Gregg Keizer

Posted on 03/01/2005 12:36:33 PM PST by Eagle9

A major wave of Bagle-like Trojan horses hit users worldwide Tuesday with numerous variations that aim to overwhelm anti-virus defenses by morphing faster than research labs can release new signatures.

The attack, which began about midnight EST, was launched in a large-scale spamming campaign, said virus researchers, and although the new threat doesn't spread on its own -- these are Trojans with Bagle characteristics, not true worms -- many security vendors have bumped up warnings to get out the word.

It's unclear how many variations are at loose. Some vendors, such as Symantec, had reported only two as of mid-morning Tuesday. Others, such as the U.K.-based Sophos, said there were at least four or five distinct versions. According to Reston, Va.-based iDefense, some sources are reporting as many as 15 copy-cats.

"Wave attacks are becoming increasingly common," said Ken Dunham, iDefense's director of malicious code research, in an e-mail to TechWeb. "Multiple minor variants are rapidly seeded into the wild to help the overall success of the attack."

The purpose of the attack seems to be to infect a large number of systems, which can later be turned into spam zombies, worm launch pads, or denial-of-service proxies.

"Compromised systems could cause all kinds of mischief," said Graham Cluley, a senior technology consultant with Sophos. "The attacker's intention is to use those computers for some other purpose, perhaps spamming. Once the Trojan's in place, it can update by downloading a new malicious component from any of a large number of Web sites."

So far, the sites -- which are hard-coded into the Trojan horse -- aren't hosting anything suspicious, added Cluley, but Sophos and others are monitoring the sites carefully. It's not unusual for an attack to infect systems, leave a backdoor open like this, and then only much later -- after the "heat" has died down -- download the zombie code.

These Trojans -- which in the confusion of the attack and the long-running problem with multiple Bagle versions, are named everything from Bagle.be to Beagle.bh to BagleDI-L -- also try to disable a large number of anti-virus or firewall products found on the target PC.

Other self-defense tactics used by the Trojans include changing the Windows HOST file to make it impossible for users to connect with security Web sites for virus updates, and renaming a security software files so that once the system is rebooted, anti-virus and/or firewall programs won't run.

"Any Trojan which turns off your anti-virus or firewall can open you up to further attack, even by very old viruses," added Cluley.

Most of the variations arrive as .exe attachments or within .zip compressed files, joined to terse e-mails with no subject and a message reading simply "Price" or "New price."

The quick spread of the threat is due to the large spamming run that launched it. "This was spammed out en mass," said Cluley. "Some companies have seen thousands of copies hit their gateways."

Most security firms were reporting a continued increase in the number of copies reaching users. "Just nine hours after it began, it was already seventh on our list of Trojan horses," said Cluley.

The facts that the initial spam seeding was much larger than usual and that so many variants rolled out so quickly speak to the deviousness of hackers, said iDefense's Dunham.

"Hackers have been testing their code prior to the attack to ensure that certain anti-virus products do not detect the new minor variants," he said. "They've have become increasingly sophisticated and organized in what they're doing [as they] attempt to steal sensitive information or gain control over computers."

The usual recommendations apply, security firms told users: update anti-virus defenses often.

Cluley went a step further. "It's time everyone woke up and stopped executable code at the gateway. There's no reason why users should be installing software from any e-mail message. That should all have to come through the IT department. Doing anything else [but blocking executables] is a huge security risk."


TOPICS: Technical
KEYWORDS: antivirus; bagle; exploit; hacker; internetexploiter; lookoutexpress; lowqualitycrap; microsoft; securityflaw; spam; trojan; windows; worm
Navigation: use the links below to view more comments.
first 1-2021-24 next last
The average home user should be able to avoid this trojan/worm by using common sense, regarding email.

The usual recommendations apply, security firms told users: update anti-virus defenses often.

Cluley went a step further. "It's time everyone woke up and stopped executable code at the gateway. There's no reason why users should be installing software from any e-mail message. That should all have to come through the IT department. Doing anything else [but blocking executables] is a huge security risk."

1 posted on 03/01/2005 12:36:34 PM PST by Eagle9
[ Post Reply | Private Reply | View Replies]

To: Eagle9

It is intersesting that these attacks keep coming. I really don't think it's your little nerd sitting at his puter at home anymore.


2 posted on 03/01/2005 12:40:45 PM PST by marty60
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9

Theres a really good way to avoid this, its a great cure. --> http://distrowatch.com/

I had to be the first :)


3 posted on 03/01/2005 12:40:59 PM PST by Brian328i
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

Virus alert!


4 posted on 03/01/2005 12:43:21 PM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Stop--correction should be "Trojan" Alert!


5 posted on 03/01/2005 12:43:53 PM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 4 | View Replies]

To: marty60
I do, It's really not that hard to crank out a virus, worm, or Trojan.

All you comp sci guys out there knows what a fork bomb is. At school the night before a big project was due in the comp sci department, the servers would always magically crash. They would change the security, then 100+ comp sci people went to work on crashing the servers instead of doing their projects.
6 posted on 03/01/2005 12:45:13 PM PST by tfecw (Vote Democrat, It's easier then working)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

Is this Windows Outlook specific?


7 posted on 03/01/2005 12:48:45 PM PST by Ernest_at_the_Beach (This tagline no longer operative....floated away in the flood of 2005 ,)
[ Post Reply | Private Reply | To 4 | View Replies]

To: tfecw

Good grief. Maybe you can explain to me what the point is of disrupting the lives of so many people. just for the H of it? What a waste of time, energy and intellect.


8 posted on 03/01/2005 12:49:51 PM PST by marty60
[ Post Reply | Private Reply | To 6 | View Replies]

To: Ernest_at_the_Beach
Is this Windows Outlook specific?

No, it's Dumb User Opening Attachment specific.

9 posted on 03/01/2005 12:51:29 PM PST by Mannaggia l'America
[ Post Reply | Private Reply | To 7 | View Replies]

To: marty60
Good grief. Maybe you can explain to me what the point is of disrupting the lives of so many people. just for the H of it? What a waste of time, energy and intellect.

Bah! The people writing these viruses are the good guys. Let's not blame them for anything. It's all Microsoft's fault. </sarcasm>

10 posted on 03/01/2005 12:53:11 PM PST by Mannaggia l'America
[ Post Reply | Private Reply | To 8 | View Replies]

To: Eagle9

You would think that by now, no one would be dumb enough to click on an email attachment, especially one in "terse e-mails with no subject and a message reading simply 'Price' or 'New price'."

But nooooo. Ten thousand bozos will turn their computers into spam engines by clicking on this thing. And then they'll wonder why their computer is running so slowly.


11 posted on 03/01/2005 12:55:21 PM PST by Nick Danger (The only way out is through)
[ Post Reply | Private Reply | To 1 | View Replies]

To: marty60
I can't explain something like that. Some people get their jollies out of screwing with other people. Esp punk kids who can't get dates so they spend their time screwing with people. Plus there is the recognition factor. People who would normally never amount to anything get their work of "art" plastered up all over the MSM and broadcast world wide. While i don't condone hacking websites or whatever. I can see the power element involved with the knowledge that you hacked into "insert famous organization"'s website. Which is how most of these clowns get caught.

I didn't partake in the server crashes. The professors were sympathetic the first couple of times then did the ol well you had 3 weeks to work on it, why are you turning it in on the due date. Server stopped crashing.
12 posted on 03/01/2005 12:59:48 PM PST by tfecw (Vote Democrat, It's easier then working)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Eagle9
It's time everyone woke up and stopped executable code at the gateway.

Any company that allows any kind of content that might contain a virus payload in through their email gateway deserves to get hit. If you need to get software from someone, there are other ways than email to get it.

Not being able to email executable code is a mild inconvenience compared to having to clean up the mess caused by a virus let loose in a corporate LAN environment. I speak from experience.

13 posted on 03/01/2005 1:02:34 PM PST by Disambiguator
[ Post Reply | Private Reply | To 1 | View Replies]

To: marty60

I think it is one or more foreign governments / their militaries.


14 posted on 03/01/2005 1:07:55 PM PST by GOP_1900AD (Stomping on "PC," destroying the Left, and smoking out faux "conservatives" - Take Back The GOP!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Nick Danger

I've been getting these idiotic FBI@FBI.GOV e-mails claiming "You've been visiting 40 illegal sites" and demaning I fillout a questionnaire conveniently contained in a compressed file.


15 posted on 03/01/2005 1:08:02 PM PST by Doohickey ("This is a hard and dirty war, but when it's over, nothing will ever be too difficult again.”)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Brian328i

Or, you can use FireFox on OS X.


16 posted on 03/01/2005 1:11:08 PM PST by stinkerpot65
[ Post Reply | Private Reply | To 3 | View Replies]

To: marty60
What a waste of time, energy and intellect.

True, but it's no longer kids doing it for fun.

Virus/spam and crime are a team now. There's an underground economy in infected machines (bots) used for spam and denial of service attacks have been used in extortion of online gambling sites.

17 posted on 03/01/2005 1:12:11 PM PST by D-fendr
[ Post Reply | Private Reply | To 8 | View Replies]

To: Doohickey

Doohickey -- I've been getting the same attack since last Friday... I delete everyone of them without looking because I figure if going to RushLimbaugh.com and Free Republic are illegal websites I'm ready for a confrontation with any authorities....


18 posted on 03/01/2005 1:27:22 PM PST by A message (yep)
[ Post Reply | Private Reply | To 15 | View Replies]

To: stinkerpot65
Or, you can use FireFox on OS X.

Let's contribute something constructive to the discussion, okay? :^)

19 posted on 03/01/2005 1:28:36 PM PST by Disambiguator
[ Post Reply | Private Reply | To 16 | View Replies]

Here's an example (copied from Message Source):
_________________________________________________________
Subject:
Message-ID: <usyjdicxunpfamqogsh@bellsouth.net>
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="--------bilnsatjoywkldgbtsxk"

----------bilnsatjoywkldgbtsxk
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: 7bit
<html><body>
price<br><br>
<br>
</body></html>

----------bilnsatjoywkldgbtsxk
Content-Type: application/octet-stream;
name="newprice.zip"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="newprice.zip"
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20 posted on 03/01/2005 1:31:51 PM PST by Eagle9
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson