Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Botnet Herders Attack MS06-040 Worm Hole 112

Laljeetji writes "eweek reports that the first wave of malicious attacks against the MS06-040 vulnerability is underway, using malware that hijacks unpatched Windows machines for use in IRC-controlled botnets. The attacks, which started late Aug. 12, use a variant of a backdoor Trojan that installs itself on a system, modifies security settings, connects to a remote IRC (Internet Relay Chat) server and starts listening for commands from a remote hacker. On the MSRC blog, Microsoft is calling it a very small, targeted attack that does not (yet?) have an auto-spreading mechanism. LURHQ has a detailed analysis of the backdoor."
This discussion has been archived. No new comments can be posted.

Botnet Herders Attack MS06-040 Worm Hole

Comments Filter:
  • IRC the weakpoint? (Score:2, Insightful)

    by ShaneThePain ( 929627 ) on Sunday August 13, 2006 @05:51PM (#15899603) Journal
    If the hacker has to use IRC to command the bots, cant the entire virus be reverse-engineered to find out the IRC channel and then the hackers IP address?
    I would like to see these virus authors caught and publicly executed for once.
  • by winkydink ( 650484 ) * <sv.dude@gmail.com> on Sunday August 13, 2006 @05:56PM (#15899625) Homepage Journal
    How are the IRC channel and the hacker's IP address related? Just because somebody visits some random IRC channel doesn't make them the bot author. Security researchers, for example, will also be found there.

    Also, most bot herdes are in eastern europe, brazil, or developing countries. Catching hackers isn't high on the list of law enforcement priorities in the countries (and, if the right amount has been paid to the right people, it's completely ignored).
  • A Solution... (Score:5, Insightful)

    by nmb3000 ( 741169 ) on Sunday August 13, 2006 @06:02PM (#15899648) Journal
    Find a way to make the average user patch software.

    As wonderful as it would be if all software was completely bug free and contained no security holes, it's simply impossible. No product, be it OSS or commercial, is free of these banes. On the other hand, problems like this would nearly go away, if only users would patch the software. Whether it's a new exploit in Windows or Apache or phpBB, if you don't patch, you're going to get screwed. Yes, it seems like Microsoft products have more patches than average, but at least they have patches. Blaster and MyDoom? They'd have never hit the news if users were patched. Automatic Updates in XP is a great step forward, but it's still opt-in.

    Some people seem amazed when I say I had no direct problems with Blaster or Welchia, and they don't seem to get it that these problems essentially always appear after a patch is release which means there is no valid reason for their survival. Patch, patch, patch, patch, patch. Yes, slightly monotonous, but if users would simple do it, we'd stop seeing these equally monotonous news stories about Exploits of Doom.
  • Re:A Solution... (Score:5, Insightful)

    by Ph33r th3 g(O)at ( 592622 ) on Sunday August 13, 2006 @06:11PM (#15899682)
    A good start would be for Microsoft to stop attaching new EULA conditions or spyware (e.g. WGA) as a prerequsite to getting patches conveniently.
  • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Sunday August 13, 2006 @06:22PM (#15899709)
    It would almost as stupid for a company to deploy patches without testing them as it would be to never patch at all.

    So there will be a delay between a patch being released and that patch being deployed on production systems.

    And going into "crisis mode" for 2 weeks, starting the second Tuesday of every month is a bit much to expect of people.
  • Re:A Solution... (Score:5, Insightful)

    by Jerf ( 17166 ) on Sunday August 13, 2006 @06:29PM (#15899730) Journal
    This is a complicated topic, and I don't have a pat answer. But let me give you two of the counterpoints:
    1. Corporate users can't do that; they need to test the patches first. Obviously, "corporate" users could then get an option to not auto-download the patches. But the corporations aren't conservative about patching because they like to drag their feet; technically it's easy to roll out a patch in a matter of hours, even minutes for small ones that don't require a reboot. The problem is that patches aren't perfect, and they will tend to break computers that used to work, and programs that used to work. Worst case scenario they can even destroy data.

      Corporations have trouble because they may well have thousands of configurations they need to support, so even if 1% of them fail, it's a major problem. Still, imagine if Microsoft forces a patch out, and they cause the machines that have Quicken version 6.3532 build 4 to completely destroy all financial records on their next startup. (Or even just render them unreadable, since we're assuming non-technical users.) Imagine the liability issues, which, frankly, probably terrify the executives at Microsoft already when they issue a patch. Forcing the patches on users makes those issues even worse.
    2. If Microsoft has the ability to force your machine to run an update, they literally own your machine. They can make it do anything, and you can't stop them. Already the activation stuff has caused some issues, and I've basically bailed on Windows as a result and consider it a good reason for everybody else to bail, too. The computer needs to belong to you, not your corporate overlords. (The term "corporate overlord" in this case is used without sarcasm, because at least in computing terms, they really are.)
    I think the problem boils down to the fact that it may not be possible to run a general-purpose computer in an incredibly hostile environment without a high degree of operator skill, and people in general, quite justifiably, do not wish to attain this high degree of skill, just so they can safely surf the web, send email, and use IM. Until a completely secure computer is built, or at least a far more secure one, I'm not sure what can be done about this.

    The worst part is, none of what I've said here contradicts anything you've said. It's all in play at once? So, which side dominates, and under what circumstances? I really couldn't tell you. However, I would think the empirical evidence at the moment is in your favor. But is the only/best solution really to cede control over your computer to Microsoft (which are the people who got you into this situation in the first place)?

    At least Open Source doesn't have that issue; since nobody is in charge and nobody is making money by controlling your computer (DRM, etc), the conflict of interest involved in creating a security situation where what seems to be the best solution is deeding your computer over to the same people doesn't come into play.
  • Re:A Solution... (Score:2, Insightful)

    by Omeger ( 939765 ) on Sunday August 13, 2006 @06:30PM (#15899731) Journal
    Are you the guy who done that Ask Slashdot post yesterday?
  • by mabu ( 178417 ) on Sunday August 13, 2006 @06:43PM (#15899768)
    If you're running norton you've got bigger problems than this worm.
  • Re:A Solution... (Score:2, Insightful)

    by kfg ( 145172 ) * on Sunday August 13, 2006 @06:43PM (#15899771)
    As wonderful as it would be if all software was completely bug free and contained no security holes, it's simply impossible.

    Correct me if I'm wrong, but isn't a patch software?

    KFG
  • by plasmacutter ( 901737 ) on Sunday August 13, 2006 @06:45PM (#15899772)
    is that their patches generally involve strengthening not only system security for the user, but system security for use by ms against the user (e.g. DRM)

    prime examples so far - bundling of windows genuine advantage with security patches and xbox 360 forced updates through live.
  • by twitter ( 104583 ) on Sunday August 13, 2006 @06:58PM (#15899807) Homepage Journal

    Suppose the bots all used AIM or MSN Messenger servers. Would you demand that those be taken down?

    The weak point is not IRC or any other communications method. The weak point is software that's so easy to exploit it has new "critical" patches every month [insert tampon jokes here].

  • Re:A Solution... (Score:3, Insightful)

    by Secrity ( 742221 ) on Sunday August 13, 2006 @08:19PM (#15900059)
    MS has deeper pockets and can afford more expensive layers and iron clad EULAs. A consultant is less likely to be able to afford an expensive lawer and is also more likely to have a contract that a can be shredded by a competent lawyer. A jury is likely to be more sympathetic to a user suing a computer consultant than a computer consultant suing MS.
  • Re:A Solution... (Score:2, Insightful)

    by Skater ( 41976 ) on Sunday August 13, 2006 @09:01PM (#15900195) Homepage Journal
    Presumably the people on that jury would've used computers and had problems during a Windows upgrade. After all, how are you going to find 12 people that haven't?
  • by Firehed ( 942385 ) on Sunday August 13, 2006 @10:39PM (#15900480) Homepage
    Any updating system that requires users to type in commands, especially any commands not written in plain English ("Patch my computer.[return]"), will fail miserably among the mainstream users. Let's face facts here - Windows Update is *easier* than that. Safer? No. Forces EULA changes? Yep. But it's automatic and requires absolutely NO thinking on the part of the end-user. An update system that requires the user to do pretty much anything besides clicking 'OK' at the automatic installation prompt isn't going to work.

    We need a best of both worlds solution here. Windows Update is an excellent concept. But the execution sucks for the reasons you specified - EULA changes, WGA, poor/untested/damaging patches. It needs work. But in the long run, it'll be a lot more successful and helpful than any apt-get command, or anything else that's not entirely automatic beyond authorizing changes.
  • Re:A Solution... (Score:4, Insightful)

    by the_bard17 ( 626642 ) <theluckyone17@gmail.com> on Monday August 14, 2006 @12:26AM (#15900798)
    So let's play the other side: I tell the client not to install any patch without explicitly finding out what the patch corrects and ensuring that it will not damage his computer (with regards to software, not that many of my clients would be able to tell the difference). Most of my clients do not have the patience nor the time to research each patch. Of those that do, most would not be able to understand exactly what the patch does. Following that, most of my clients will not install the patches.

    So when the next Blaster/Welchia-like worm hits, they haven't downloaded the patch 'cause they listened to me... and then I get to go back out and clean the virus off their system, and explain how they got the virus (worm, really, but I usually get that glazed-eye look when I explain the difference), and what they could've done to prevent it. Then I get to charge them, and explain why I'm charging them. See a pattern here?

    End result: the client (end-user) is the one left hanging. If he blindly patches, he runs into problems. He blindly ignores the patches, he runs into problems. If we could only raise his level of computer literacy, he might actually have a chance to understand what the patch does, what might interfere with it, and possibly even solve the problem on his own if it occurs.

    Seeing as that's very unlikely to occur, the system breaks down. Something's gotta give. Something's gotta change. Until it does, the end-user gets left hanging.

Say "twenty-three-skiddoo" to logout.

Working...