Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Security Experts Name Mysterious Trojan: Stumbler
InternetWeek.com ^ | June 20, 2003 | Techweb News

Posted on 06/20/2003 11:28:19 PM PDT by FairOpinion

The mysterious trojan horse that's been making security experts scratch their heads now has a name as more details of the oddball malware were made available.

The trojan horse that has been causing confusion and concern among security researchers for over a month now has been dubbed 'Stumbler' by experts at Internet Security Systems (ISS).

As reported earlier, Stumbler embeds itself in Unix systems and seems to be part of a concerted effort to map Internet-connected networks using port scanning techniques. A copy of the trojan was finally captured Wednesday, and investigation of its code began Thursday.

After additional analysis, researchers at the security firm Intrasec tentatively concluded late Thursday that the captured sample is a copycat of the real trojan, created to mimic the behavior of another trojan or worm. In fact, said Intrasec, Stumbler seems to be based on a variety of media reports that have described the malware's hypothetical behavior and output.

Unsure as of yet how to describe Stumbler -- trojan, backdoor, zombie, or worm -- Intrasec called for additional analysis, and warned that although this variation is benign, modified versions could, in fact, prove malicious.


TOPICS: Crime/Corruption; Culture/Society; Extended News; News/Current Events; Technical
KEYWORDS: attack; computer; computervirus; hack; internet; linux; portscan; scriptkiddies; security; stumbler; techindex; trojan; trojanhorse; unix
Navigation: use the links below to view more comments.
first 1-2021-33 next last
Earlier article about this Trojan (which above article mentions):

http://www.informationweek.com/story/showArticle.jhtml?articleID=10700645

Security Researchers Feverishly Track New Trojan June 19, 2003

The threat throws off lots of noise and seems to be mapping the Internet. By George V. Hulme

There's a new security threat out on the Internet, but it's not clear how much of a threat it really is. Security researchers at Internet Security Systems say they've captured the code for a sneaky new Trojan application that has installed itself on an unknown number of Internet-connected servers and is attempting to scan and map networks connected to the Internet and send that information back to its controller. Dan Ingevaldson, team leader for Internet Security Systems' X-Force R&D unit, says researchers are studying the Trojan--currently dubbed 55808 for its Windows size--which has been causing confusion for about a month in security circles. Security experts managed to capture their first copy of the Trojan on Wednesday, and they're still working to determine exactly what the Trojan is trying to accomplish.

One thing is clear: Trojan 55808 is sneakier than previous Trojan horses. It doesn't self-propagate, like a virus or a worm, and requires the attacker to plant it on systems. But it does transmit a lot of network noise designed to throw off cybersleuths attempting to find the IP addresses of infected systems, as well as the address of the Trojan's writer or controller.

"For each machine that is infected, it will throw off 1,000 fake or spoofed IP addresses," Ingevaldson says.

Furthermore, the Trojan is part of a distributed network that security researchers have yet to completely understand. "All of these Trojan agents, or zombies, are working together," Ingevaldson says, "though there isn't a direct communication channel. Someone is trying to map Internet-connected networks."

The Trojan currently attacks Linux-based systems, Ingevaldson says, but it could easily be ported to other operating-system platforms. Many businesses use Linux as the operating system for their Web servers.

So far, it hasn't been possible to determine the number of infected systems, says Ingevaldson, who adds that the Trojan could be an experiment. Says Ingevaldson, "It seems to be a platform to technically see if this widespread network mapping can be done."

And a couple of other earlier threads & articles at FR:

http://www.freerepublic.com/focus/f-news/932918/posts

http://www.freerepublic.com/focus/f-news/930838/posts

1 posted on 06/20/2003 11:28:19 PM PDT by FairOpinion
[ Post Reply | Private Reply | View Replies]

To: Nexus; adam_az; rwfromkansas; Quix; BagCamAddict; Ernest_at_the_Beach; palmer
Ping

The mystery Trojan has a name now.
2 posted on 06/20/2003 11:29:20 PM PDT by FairOpinion
[ Post Reply | Private Reply | To 1 | View Replies]

To: FairOpinion; *tech_index; MizSterious; shadowman99; Sparta; freedom9; martin_fierro; ...
Thanks for the post!

OFFICIAL BUMP(TOPIC)LIST

3 posted on 06/20/2003 11:31:45 PM PDT by Ernest_at_the_Beach (Recall Gray Davis and then start on the other Democrats)
[ Post Reply | Private Reply | To 2 | View Replies]

To: FairOpinion
wonder how many unix users will show up saying it is the perfect OS now....lol
4 posted on 06/20/2003 11:32:44 PM PDT by rwfromkansas ("There is dust enough on some of your Bibles to write 'damnation' with your fingers." C.H. Spurgeon)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rwfromkansas
"wonder how many unix users will show up saying it is the perfect OS now....lol "
---

Well, it was only a matter of time. It wasn't that Linux is so perfect, it's just that hackers didn't bother with it before. But good point, I added "linux" to the key words so it will come up when people are searching on it.
5 posted on 06/20/2003 11:43:30 PM PDT by FairOpinion
[ Post Reply | Private Reply | To 4 | View Replies]

To: rwfromkansas
UNIX/LINUX has had it's share of virus, etc..

Fact is, with MS Windows and other MS Operating Systems comprising 85%* of the market, naturally, 85% of the virus proggies are going to be aimed at that system.

Other OS's, get their "fair share" of virus according to their use within the PC /Server community.

* 85% is just a guess, not an accurate one, probably. ;o)

6 posted on 06/21/2003 2:07:03 AM PDT by Drammach
[ Post Reply | Private Reply | To 4 | View Replies]

To: FairOpinion
Hmmm. Gets curiouser. At least one freeper declared the whole thing a hoax--doesn't look like it from this article.
7 posted on 06/21/2003 5:30:57 AM PDT by MizSterious (Support whirled peas!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Dominic Harr; Bush2000; Golden Eagle
For your discussion and amusement
8 posted on 06/21/2003 6:30:23 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MizSterious
That's me, and notice they haven't caught the 'original' worm yet, they caught a copycat which was written based on media reports.

Which is something I suggested would happen in that previous thread.

Notice the original program hasn't yet been caught? There might not even be an "original program."

Also, the original press release was a big load of poop - heavy on speculation, short on technical accuracy, long on FUD and hype.

Truth is, there's nothing new or scary about the behavior noted - port scans happen all the time, it's the background noise of the internet. Encoding data into parts of the TCP header other than the data segment is also not novel. It doesn't reproduce on it's own, if it did, we'd have found one by now. :)
9 posted on 06/21/2003 7:01:52 AM PDT by adam_az
[ Post Reply | Private Reply | To 7 | View Replies]

To: adam_az
You might be right--or the articles might be right. I'm going to wait and see and keep an open mind.
10 posted on 06/21/2003 7:24:46 AM PDT by MizSterious (Support whirled peas!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Golden Eagle; ThinkDifferent; Dominic Harr; TechJunkYard; Nick Danger
GoldenEagle, notice how the usual suspects won't show up on these threads... BWAHAHAHAHAHAHAHAHAHAHAHAHA!!!! We're not laughing with them -- we're laughing at them!
11 posted on 06/21/2003 10:37:38 AM PDT by Bush2000 (R>)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Ernest_at_the_Beach
OK. Explain this to me. I run a UNIX system that is connected to a Windows system through windows emulation software. The two systems are not really connected (2 different servers) -- they just are viewed on the same monitor. The Windows system is connected to the Internet. Is my Unix system vulnerable to this worm?
12 posted on 06/21/2003 11:46:05 AM PDT by afraidfortherepublic
[ Post Reply | Private Reply | To 3 | View Replies]

To: afraidfortherepublic
Is my Unix system vulnerable to this worm?

Only if the worm can infect Windows (which this article does not suggest); if not, you're in the clear.
13 posted on 06/21/2003 12:17:28 PM PDT by Bush2000 (R>)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Bush2000; afraidfortherepublic
Only if the worm can infect Windows (which this article does not suggest); if not, you're in the clear.

I dunno about that. aftr, is your unix system networked with the widows system that's on the internet or sharing an internet connection with it?

If so, than I would say that it is possible.

14 posted on 06/21/2003 12:28:41 PM PDT by AAABEST
[ Post Reply | Private Reply | To 13 | View Replies]

To: AAABEST
Note his comment: "The two systems are not really connected (2 different servers) -- they just are viewed on the same monitor"
15 posted on 06/21/2003 12:37:10 PM PDT by Bush2000 (R>)
[ Post Reply | Private Reply | To 14 | View Replies]

Comment #16 Removed by Moderator

To: AAABEST
...is your unix system networked with the widows system that's on the internet

No, the two operating systems are just being transmitted through the same CAT5 cable and are viewed on the same monitors. They operate independently. IOW, I cannot send emails from the Unix program to be viewed on the Windows OS and vice versa. Windows connections to the Internet (and Intranet) cannot be accessed throught the Unix program.

17 posted on 06/21/2003 1:30:08 PM PDT by afraidfortherepublic
[ Post Reply | Private Reply | To 14 | View Replies]

To: Nick Danger
the Junior Munchkins in here at all, FUDding on behalf of SCO...FUDding for SCO seems like such short-term thinking for Microsoft.

No Nick, Bush2K and I don't work together (LMAO), and I'm certainly no Junior Munchkin (LMAOx2).

It is a shame that lawyers have to get involved, a damn shame. But that's what happens when somebody steals something worth billions of dollars. And that IS what we're talking about. And hard as it is for some of you to see, this whole case, AND my my personal opinion on it, have nothing to do with M$.

It's an important case for our country, as these foreign programmers that have already duped IBM will continue to pilage our IP and turn our engineering accomplishments into their public property.

The very day M$ is accused of such is the very day I will hammer them just as hard.

18 posted on 06/21/2003 2:15:23 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 16 | View Replies]

To: Golden Eagle
WHOOPS, wrong thread, my apologies.

Concerning this, looks like a serious hack. You can never be too careful anymore.
19 posted on 06/21/2003 2:17:21 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 18 | View Replies]

To: Golden Eagle
Wait, maybe Danger's thread was pulled. LMAOx3
20 posted on 06/21/2003 2:18:12 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-33 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson