View Single Post
Old 08-23-2003, 06:54 AM   #4 (permalink)
darkure
Addict
 
Location: Dodging the ice pick
Quote:
Originally posted by Nizzle
Now we'll never know what the stage 2 payload was. Kind of disappointing.
From the NYTimes:
Quote:
Fearing PC Havoc, Gumshoes Hunt Down a Virus
By KATIE HAFNER and KIRK SEMPLE



t is common wisdom in the computer security world that the criminals are separated from their pursuers by only a few lines of cleverly written software.

Yesterday was a case in point.

As a computer virus named SoBig.F swamped e-mail inboxes, wreaking havoc on individual PC's and corporate computer systems, computer security experts around the world spent a tense day trying to stop a more potentially serious electronic time bomb from going off: SoBig carries an attachment that, if opened, instructs the infected computer to communicate with one of 20 host PC's that, most likely unknown to their owners, were planted with a mystery program.

But the experts did not know what would then happen to the infected machines, or what instructions they would be given. And so the race was on to find the 20 computers and isolate them from the rest of the Internet before they could potentially send out more malicious instructions to millions of computers. The time of the first attack was to be 3 p.m. Eastern time.

By late afternoon, computer experts, in collaboration with Internet service providers and law enforcement agencies around the world, declared a partial victory: they were able to decrypt the virus's software, find the 20 computers and take at least 17 offline. The Federal Bureau of Investigation also served a subpoena to an Internet service provider in Phoenix that the authorities say could be the source of the virus.

And though the experts feared the host computers might give out catastrophic instructions, like telling the infected machines to erase their hard drives or begin new attacks, Symantec Security Response, a team within the Symantec Corporation, the Internet security company, said the remaining three host machines had simply redirected computers to a pornographic Web site. It is not known whether the other 17 would have performed similarly.

"The people who are in charge have sidestepped another attack or the potential for bad things to happen," said Jimmy Kuo, a research fellow at Network Associates, another Internet security company.

SoBig is one in a series of computer viruses to threaten personal and corporate computers recently. Earlier this month, a program called Blaster and another called Nachi or Welchia were infecting hundreds of thousands of computers, although they appeared not to do severe damage. SoBig began showing up on Monday in e-mail inboxes with subject lines like "Thank you!" or "Re: Details" and "Re: Wicked screensaver." But the computer could be infected only if the recipient opened the attachment to the message.

Although commonly referred to as a computer virus, SoBig is considered a worm, because it operates independently. Unlike a virus, a worm does not attach itself to an existing computer file.

SoBig was written to run on Windows machines, and computers running the Macintosh and Linux operating systems were not affected.

Although SoBig had been around since last January, it has been modified continually. This, its sixth incarnation, included the electronic time bomb.

Yet from the moment this version first cropped up, a team of security sleuths with F-Secure, a computer security company in Helsinki, Finland, that sells antivirus software, had already begun taking it apart.

Before long, a group of eight engineers had homed in on a string of cleverly written code that the designers of SoBig had encrypted, and the engineers decided that was the nut they needed to crack.

By 3 p.m. on Thursday, after working around the clock, the engineers in Helsinki had decrypted the computer code. What they found was a list of 20 Internet Protocol, or I.P., addresses, linked to home computers in the United States, Canada and South Korea.

Further, they discovered a new twist. At 3 p.m. yesterday, tens of thousands of computers already infected with SoBig were supposed to connect to those 20 computers, using them as mere go-betweens, to retrieve a list of Web addresses. Once they were obtained, the machines infected with SoBig were supposed to download a program from those addresses.

What was supposed to happen after that no one knew, because "we stopped it," said Tony Magallanez, a systems engineer at F-Secure in San Jose.

To mitigate the threat, F-Secure engineers notified both the F.B.I. and the Internet service providers connected to the 20 computers. The addresses were then removed from the network by the Internet companies. In addition, the large telecommunications companies that provide the backbone for the Internet could have interceded and blocked all communication to those specific Internet addresses, Mr. Kuo said.

By 3 p.m., F-Secure had confirmed that 18 of the 20 target computers had been isolated and taken offline. (According to several security companies, the precise number fluctuated through the afternoon as they rechecked the computers.) Of the remaining computers, one had already been taken offline.

The host computers are most likely home PC's whose owners had no idea that their systems had been commandeered, experts said.

"I highly doubt the author of the virus owns these machines," said Johannes Ullrich, chief technology officer of SANS Internet Storm Center, a company in Bethesda, Md., that monitors Internet traffic.

Vincent Weafer, senior director of Symantec Security Response, said that when computer security technicians pretended to have an infected machine and sent messages to the host computers, they found that one of the host computers that was still on line was redirecting them to a pornography Web site. That allayed fears that the program could install a more virulent program on the infected computers, or send out more malicious worms.

Computer security experts said today that SoBig could be the largest virus yet in terms of the amount of e-mail it has generated. Other viruses have spread more quickly or have done more damage to systems and hardware, they said.

"The volume of this one is high," said Sharon Ruckman, senior director of Symantec Security Response in a telephone interview.

Although few companies reported wholesale computer shutdowns, the SoBig virus proved an enormous nuisance. Like gum on a shoe, it stuck around. By the end of the week, the virus had sent out tens of millions of unsolicited messages.

The F.B.I. is investigating the case under federal laws that prohibit computer intrusions, but no specific violations have been named.

"We don't know right now what violations have occurred until we've gathered all the facts," said Paul Bresson, an F.B.I. spokesman. "There might be something additional, like wire fraud."

Mr. Bresson said the F.B.I. was working closely with other agencies, including Homeland Security and private computer security firms.

Jeff Minor, chief executive of Easynews, an Internet service provider in Phoenix, said the F.B.I. served a subpoena to the company late yesterday morning.

Mr. Minor said he thought that a stolen credit card number was used to open an account on Easynews, and the SoBig worm was sent from that account. Mr. Minor said the account was opened seven minutes before the rogue program was sent out. He said it was embedded in an image and sent to an Internet news group devoted to pornography.

"Anyone trying to download that particular image in that news group would have been infected," Mr. Minor said.

Mr. Minor said the worm was posted to the network from a computer in Vancouver, British Columbia. "To the best of my knowledge it was at somebody's home," Mr. Minor said.

Although a broad cyberdisaster appeared to have been averted yesterday, computer security experts said computer users were not yet out of the woods. Infected computers will still be trying to connect to the master computers, they said, and will deluge the Internet with viral spam.

"We're still going to have millions of messages that the virus generates," Mr. Kuo said, adding that America Online has been blocking some 11 million SoBig e-mail messages a day.

To guard against infection, recipients should continue to delete e-mail messages containing suspicious attachments. The virus program is blocked by updated versions of most antivirus utility programs. "The No. 1 thing is, don't click on these attachments," Mr. Ullrich said.

Several Internet security sites are offering free software tools and step-by-step instructions on identifying and cleaning an infected computer.

SoBig, Mr. Ullrich said, is "just another pain in the neck for system administrators to deal with."
(Bold is mine)
__________________
COYW
darkure is offline  
 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360