Vulnerabilities / Threats
2/2/2011
01:46 PM
Connect Directly
RSS
E-Mail
50%
50%

Waledac Botnet Contains Almost 490,000 Stolen Email Passwords

With numerous real-world credentials built-in, the worm can bypass many spam and security defenses, find security researchers.

Security researchers have cracked the code for version 2 of the Waledac worm, used by attackers to build botnets, and found that it carries numerous credentials that enable it to bypass spam filters and security defenses.

"We found that the botmasters have a tremendous amount of stolen credentials," blogged Brett Stone-Gross, a developer and threat analyst at LastLine, a cybercrime intelligence and network monitoring firm.

For starters, the most recent version of Waledac -- the successor to the Storm worm -- contains 123,920 login credentials for FTP servers, through which Waledac's botmasters -- or rather, their automated attack toolkits, issue instructions to worm-infected (aka zombie) PCs.

Oftentimes, these instructions involve rerouting the browsers of infected machines to Web sites that serve malware or advertisements for discount pharmaceuticals. In January alone, LastLine saw the worm redirecting to nearly 10,000 compromised or malicious Web pages across 222 Web sites.

LastLine also discovered that Waledac contains 489,528 credentials for POP3 email accounts. "These credentials are known to be used for 'high-quality' spam campaigns," Stone-Gross said. "The technique abuses legitimate mail servers by authenticating as the victim through the SMTP-AUTH protocol to send spam messages. This method makes IP-based blacklist filtering considerably more difficult."

In December 2010, the previous version of Waledac went dark for about a week. After its hiatus, the updated version appeared, containing not only the built-in credentials, but also enhanced command-and-control capabilities, including improvements in the proprietary Ad Hoc Network Management Protocol (ANMP) the worm uses to communicate with a "bootstrap server" that issues its instructions.

Although Waledac has been relatively quiet recently, the worm still has cybercrime potential to spare. "The Waledac botnet remains just a shadow of its former self for now, but that's likely to change given the number of compromised accounts that the Waledac crew possesses," said Stone-Gross. As of January 2011, LastLine said that the Waledac botnet appeared to comprise about 12,000 infected machines.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-5142
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb 1.09 and earlier, as used in Mimbo Pro 2.3.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the src parameter.

CVE-2010-5302
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb before 1.15 as of 20100908 (r88), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING.

CVE-2010-5303
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in the displayError function in timthumb.php in TimThumb before 1.15 (r85), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to $errorString.

CVE-2014-0965
Published: 2014-08-21
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted SOAP response.

CVE-2014-3022
Published: 2014-08-21
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted URL that triggers an error condition.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.