Attacks/Breaches
4/25/2013
06:02 PM
Connect Directly
RSS
E-Mail
100%
0%

Possible Exploit Avenue Discovered For DarkLeech Web Server Attacks

A researcher at Cisco has uncovered a possible link between a malicious script and an attack that has compromised thousands of Web servers around the globe

A malicious script targeting a year-old vulnerability may be tied to the DarkLeech attack campaign caught infecting websites earlier this month.

DarkLeech is believed to have compromised thousands of Web servers around the globe running Apache 2.2.2 and above. The attackers infected the servers with an SSHD backdoor that enables them to upload and configure malicious Apache modules that are, in turn, used to inject malicious iFrames onto legitimate sites.

According to Craig Williams, engineering technical leader at Cisco Systems, the malicious script in question may be playing a role in the DarkLeech campaign by providing an avenue of attack. The script was spotted targeting a Horde/IMP Plesk Webmail vulnerability that exists in unpatched versions of the Parallels Plesk control panel software commonly used by Web hosting providers. By injecting malicious PHP code in the username field, attackers can bypass authentication and upload files to the targeted server.

In a blog post, Williams called the situation a reminder to Web operators and administrators to keep their systems up-to-date.

"In order to upload the malicious DarkLeech modules, attackers must first gain root access to the server," he tells Dark Reading. "We know that both cPanel and Plesk have been vectors for compromise in the DarkLeech attacks. Given that the Horde/IMP Plesk Webmail vulnerability is being actively exploited, it is a possible avenue for gaining the needed access. However, as we noted in our blog post, this particular vector is not as common as the Plesk remote access vulnerability [CVE-2012-1557] described in the MalwareMustDie report."

In this case, the attackers were using an IRC-based botnet as a payload that included basic flooding capabilities. According to Williams, the Perl script used by the attackers has been around for a number of years, and the bot is openly discussed in PHP exploit groups.

"Upon successful compromise, the script joins the compromised server to an IRC channel for command and control," he says. "It then begins a series of port scans and Google searches to find other vulnerable servers. Information collected is then relayed to the aforementioned IRC channel, where it can be acted upon by the attacker(s).

"As for the exploit itself, since this is command injection vulnerability, there are no complicating factors to limit the number of times it can be exploited on a single server. Contrast this with a buffer overflow, for example, where the memory would likely become corrupted after repeated exploitation attempts, resulting in unpredictable behavior. That resulting instability would help inhibit future compromises -- a constraint not found with the Horde/IMP Plesk Webmail vulnerability."

A Parallels spokesperson says that the vulnerability Williams is warning about was in the third-party Horde webmail for Plesk 9.3 and earlier, and that while those Plesk versions are "end-of-lifed now," a patch for the issue was released in February 2012.

While the exact number of servers compromised by DarkLeech may not be readily known by researchers, Cisco TRAC analyzed several thousand compromised websites and tracked them back to their associated hosts, says Williams. Ultimately, the company identified infected hosts in more than 48 countries.

"The highest concentration of compromised Web servers were in the U.S., U.K., and Germany," he says. "Given that the average Web server hosts multiple websites, it's not at all speculative to state that tens of thousands of websites have been impacted by this."

* This story was updated to add a statement from Parallels.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4734
Published: 2014-07-21
Cross-site scripting (XSS) vulnerability in e107_admin/db.php in e107 2.0 alpha2 and earlier allows remote attackers to inject arbitrary web script or HTML via the type parameter.

CVE-2014-4960
Published: 2014-07-21
Multiple SQL injection vulnerabilities in models\gallery.php in Youtube Gallery (com_youtubegallery) component 4.x through 4.1.7, and possibly 3.x, for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) listid or (2) themeid parameter to index.php.

CVE-2014-5016
Published: 2014-07-21
Multiple cross-site scripting (XSS) vulnerabilities in LimeSurvey 2.05+ Build 140618 allow remote attackers to inject arbitrary web script or HTML via (1) the pid attribute to the getAttribute_json function to application/controllers/admin/participantsaction.php in CPDB, (2) the sa parameter to appl...

CVE-2014-5017
Published: 2014-07-21
SQL injection vulnerability in CPDB in application/controllers/admin/participantsaction.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to execute arbitrary SQL commands via the sidx parameter in a JSON request to admin/participants/sa/getParticipants_json, related to a search parameter...

CVE-2014-5018
Published: 2014-07-21
Incomplete blacklist vulnerability in the autoEscape function in common_helper.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to conduct cross-site scripting (XSS) attacks via the GBK charset in the loadname parameter to index.php, related to the survey resume.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.