Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Linux webserver botnet pushes malware
The Register (UK Tech) ^ | 2009-09-12 | Dan Goodin

Posted on 09/13/2009 9:24:24 AM PDT by dayglored

A security researcher has discovered a cluster of infected Linux servers that have been corralled into a special ops botnet of sorts and used to distribute malware to unwitting people browsing the web.

Each of the infected machines examined so far is a dedicated or virtual dedicated server running a legitimate website, Denis Sinegubko, an independent researcher based in Magnitogorsk, Russia, told The Register. But in addition to running an Apache webserver to dish up benign content, they've also been hacked to run a second webserver known as nginx, which serves malware.

"What we see here is a long awaited botnet of zombie web servers! A group of interconnected infected web servers with [a] common control center involved in malware distribution," Sinegubko wrote here. "To make things more complex, this botnet of web servers is connected with the botnet of infected home computer(s)."

...

It's unclear exactly how the servers have become infected. Sinegubko speculates they belong to careless administrators who allowed their root passwords to be sniffed. Indeed, the part of the multi-staged attack that plants malicious iframes into legitimate webpages uses FTP passwords that have been stolen using password sniffers. It's likely the zombie servers were compromised in the same fashion, he explained.

With about 100 nodes, the network is relatively small, making it unclear exactly what the attackers' intentions are. All of the boxes examined so far have run the Apache webserver on a various distribution of Linux, he said.

"Probably it's some sort of proof-of-concept thing for hackers," he wrote. "Or maybe they have many more other compromised servers waiting for their turn."

(Excerpt) Read more at theregister.co.uk ...


TOPICS: Business/Economy; News/Current Events; Technical
KEYWORDS: apache; botnet; linux; malware; nginx; trojan; webserver
So, we have "Linux" and "malware" in the same headline.

But there's not suddenly some "Linux malware" -- e.g. a virus that attacks Linux -- rather, Linux/Apache admin passwords were obtained illegally and Windows malware distribution software was installed on the Linux/Apache webservers.

In other words, there are 100 Linux webservers running Apache, where "careless administrators" either used weak passwords or allowed them to leak to bad guys. Not surprising, given how many Linux/Apache webservers are on the interwebs today.

Linux Administrator: "Gee, you mean if I let bad guys have my admin passwords, they'll do something bad? Wow, who knew???"

But it's interesting nonetheless. Just not as earth-shattering as it seems from the headline.

1 posted on 09/13/2009 9:24:25 AM PDT by dayglored
[ Post Reply | Private Reply | View Replies]

To: dayglored; ShadowAce

Tech ping?


2 posted on 09/13/2009 9:24:47 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

You mean ‘root123’ isn’t safe?


3 posted on 09/13/2009 9:26:28 AM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user
> You mean ‘root123’ isn’t safe?

That's right. You should always "Leet-speak" your passwords.

Use "r00t123" instead. ;-)

4 posted on 09/13/2009 9:28:58 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: dayglored

It’s always an ‘inside job’ with real OSes.

There were a bunch of Linux distros recently that had root kits pre-installed.

If you are going online with your installation, always get your distro from known sources and make sure you set up the security right. Plenty of books to help you out with that.


5 posted on 09/13/2009 9:29:00 AM PDT by Tarpon (The Joker's plan -- Slavery by debt so large it can never be repaid...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

‘admin’ is the safest.


6 posted on 09/13/2009 9:29:40 AM PDT by Jeff Chandler ("People are idiots." -Thomas A. Caswell)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Jeff Chandler; proxy_user
> ‘admin’ is the safest.

Probably ought to Leet-speak that one too: "adm1n"

It's the only way to be sure.

7 posted on 09/13/2009 10:01:21 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: dayglored
There is another aspect.

Sometimes people run scripts (in Apache, or any other webserver) that are insecure.

The result is once you figure out how to manipulate it, the webserver running the flawed script becomes one big back door.

This is something that will affect any OS.

Example: Open Bulletin Board "root_path" Parameter Handling File Inclusion Vulnerability
8 posted on 09/13/2009 10:19:44 AM PDT by Fichori ('Wee-Weed Up' pitchfork wielding neolithic caveman villager with lit torch. Any questions?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fichori
> There is another aspect. Sometimes people run scripts (in Apache, or any other webserver) that are insecure...

Yep, good point.

The basic underlying OS can be as secure as possible (e.g. Unix) and admministrators can still compromise the server by adding insecure software to it.

And calling something "Open" doesn't guarantee security -- it only means it's possible for folks to look into it and see what might not be kosher. The vulnerabilities still have to be found and fixed.

9 posted on 09/13/2009 10:32:41 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: dayglored
Put Ubuntu on my laptop last week. My first Linux machine ever. The most satisfying part of installation was the question, "Use the whole disk? (this will erase your copy of Windows and all partitions).

Yes. No turning back now.

10 posted on 09/13/2009 10:51:20 AM PDT by Sender (It's never too late to be who you could have been.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sender
> Put Ubuntu on my laptop last week. My first Linux machine ever. The most satisfying part of installation was the question, "Use the whole disk? (this will erase your copy of Windows and all partitions). Yes. No turning back now.

I understand that satisfaction! (Although to be fair, I BootCamped a partition on one of my Mac Minis to install the RC of Win7...)

And if you do find yourself in need of Windows (e.g. a Windows-only app), you can go to VMware's site (www.vmware.com) and download FREE tools that allow you to make and run VMs (Virtual Machines) where you can install Windows in a captive environment.

The VM is a folder with a half-dozen files that are the "memory", "disk", and other parts of the Windows installation. Bootable backup consists of a copy of the folder. Crashes or disk corruption or viruses? Revert to a backed-up copy of the folder.

I understand your resolve ("No turning back") but it's also useful to know that there are options that are in many ways better than having Windows installed "on the metal".

I tired of Windows as my primary OS at home and switched to Fedora Linux about five years ago; lasted about three years and then switched to Mac OS-X because of better VM support. Good luck!

[Disclosure: I'm not associated with VMware in any way, except as a satisfied customer the past four years. I run Mac-OS-X, Windows, Linux, BSD-Unix, and others every day, and don't engage in OS wars. I even run the VMware host software on OS-X, Linux, and Windows as need may be.]

11 posted on 09/13/2009 11:27:52 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Tarpon
It’s always an ‘inside job’ with real OSes.

Poor security practices will get you in trouble with any OS.

FTP sends passwords in the clear. If you don't use a secured connection, it becomes vector for compromise -- especially if the FTP password is the same as the login password for the same account.

Personally, I refuse to use FTP. I only transfer files via secure HTTPS or secure SSH. And my SSH server doesn't even accept a regular password tunneled over the secure connection: it requires a private key that is the equivalent of 256 characters. I could give you the root password and you still couldn't login.

12 posted on 09/13/2009 6:01:09 PM PDT by justlurking (The only remedy for a bad guy with a gun is a good guy with a gun.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

13 posted on 09/14/2009 5:29:34 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: justlurking

yep, that’s why I recommend if you are setting up an online system, read and follow the security books.


14 posted on 09/14/2009 5:52:12 AM PDT by Tarpon (The Joker's plan -- Slavery by debt so large it can never be repaid...)
[ Post Reply | Private Reply | To 12 | View Replies]

To: justlurking
> Personally, I refuse to use FTP. I only transfer files via secure HTTPS or secure SSH. And my SSH server doesn't even accept a regular password tunneled over the secure connection: it requires a private key that is the equivalent of 256 characters.

Yep, that's the way to go.

We disabled PasswordAuthentication and PermitRootLogin a while back. It was initially inconvenient for some people to switch over to only using SSh/RSA keys, but there really isn't any better way to stop the password attacks.

OTOH, since individuals can set their own SSh/RSA key passphrases to whatever they want, including null, there's the problem of them losing their private key (stolen/lost laptop, etc.). We have a policy that requires any lost or stolen item with a private key to be reported immediately so that I can disable the associated public key stored on the servers...

> I could give you the root password and you still couldn't login.

True, unless you have some form of remote console such as a network KVM, or your server is a VM under a control app that gives you a virtual console. In which case the security of the KVM and virtual console app becomes your weakest link...

15 posted on 09/14/2009 7:10:05 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Sender
HEAR, HEAR!

Before you get too entrenched with Ubuntu, give Linux Mint a shot.

Don't get me wrong -- Ubuntu's great, I use it on a couple of machines, and it shares a lot of its guts with Mint -- but Mint's interface is more like Windows', plus it comes with the cool Compiz desktop effects pre-installed.

16 posted on 09/14/2009 7:11:04 AM PDT by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 10 | View Replies]

To: dayglored
One of the really cool things about using vmware server/workstation in a corporate environment, is it allows one to have multiple OSes available that may not be needed all the time, yet you don't need additional hardware or have to reboot a box just to access that OS.

 For instance, I occasionally need to use an IIS server to produce documentation (screenshots and such) for folks I support. I can fire up a vmware instance, do what I need to do, then either shut ot down, or just leave it running if I think I may need it again in the next few days. I'm constantly amazed at otherwise technical folks who don't see the utility of this. This is really useful if you need to generate an SSL certificate for a webserver. Rather than going to the production box, they could just use a VM to generate the CSR, install the cert, then export it for use on the production machine. To me, having this kind of tool handy is a no-brainer.

Unfortunately, that doesn't seem to be universal here .

VMWare completely rocks IMO. I've tried some of the other VM solutions, and they just aren't at the level of functionality or stability of VMWare yet.

17 posted on 09/14/2009 7:52:10 AM PDT by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: dayglored

“Research has shown that E%3hl5(*n!9**B is cryptographically the most secure password that can be used. Please change all of your accounts to use this password in order to ensure better security.”

I saw something like that on the internet way back when. I wonder how many people bought it.


18 posted on 09/14/2009 7:52:27 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 1 | View Replies]

To: martin_fierro
The distro I installed is EEEbuntu, for the EEEpc, and it has the full Compiz package in it. It also has all the EEE drivers and widgets.

Everything works after installation, with OpenOffice, VLC media player, Skype etc. And no Microsoft products at all! Is that legal?

19 posted on 09/14/2009 1:53:59 PM PDT by Sender (It's never too late to be who you could have been.)
[ Post Reply | Private Reply | To 16 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson