Risk
7/10/2009
05:50 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Cyber Attack Code Starts Killing Infected PCs

Infected computers participating in the distributed denial of service attack on U.S. government and South Korean Web sites are set to destroy their own data.

The botnet-driven cyber attack on government, financial, and media sites in the U.S and South Korea includes a newly discovered danger: The malicious code responsible for driving the distributed denial of service attack, known as W32.Dozer, is designed to delete data on infected computers and to prevent the computers from being rebooted.

"Your machine is completely hosed at this stage," said Vincent Weafer, VP at Symantec Security Response.

The malicious code includes instructions to start deleting files when the infected computer's internal clock reaches July 10, 2009. That's today.

According to Weafer, the malicious code will attempt to locate files with any of more than 30 different extensions, such as .doc, .pdf, and .xls, copy the data to an encrypted file that's inaccessible to the user, and then overwrite the data in the original files. It targets files associated with office, business, and development applications.

The malicious code is also programmed to modify infected computers' Master Boot Records. The change renders computers inoperable following any attempt to reboot.

The impact of this self-destruct sequence should be minimal, however. Weafer said that he expects only a few thousand machines will be damaged. "I don't expect this to be a major issue, except perhaps in South Korea," he said.

The cyber attack against sites in the U.S. and South Korea began on July 4 and temporarily interfered with access to the Web sites of the Treasury Department, the Transportation Department and the Federal Trade Commission.

The South Korean Intelligence Service estimated that about 20,000 compromised computers -- mostly in South Korea -- had been ordered to conduct a Distributed Denial of Service (DDoS) attack on U.S. and South Korean sites.

Given the timing, which coincided with a North Korean missile test, suspicions have been raised about the involvement of hackers in North Korea or possibly China.

In a press briefing yesterday, State Department spokesman Ian Kelly said, "[The attacks] are continuing, and we are taking measures to deal with this and any potential new attacks." He said he had no information about whether North Korea was involved.

It is possible to direct an attack of this sort from anywhere. According to Alan Paller, research director at The SANS Institute, the compromised computers participating in this attack are located all over the world, including the U.S. The bots that participate also vary over time, so that the source of the attack is constantly changing.

"The attacks have become increasingly sophisticated since the end of last week -- it started as a flood that was easy for network service providers to filter and then went through at least two increases in sophistication so that the flood looks more and more like legitimate traffic," said Paller in an e-mail. "Network providers have to work much harder to filter out malicious traffic that resembles legitimate traffic."

But with W32.Dozer already deleting files and crippling its hosts, the attacks should soon subside.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.