Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,194,585 members, 7,955,157 topics. Date: Saturday, 21 September 2024 at 06:08 PM

Ongoing Malware Attack Targeting Apache Hijacks 20,000 Sites - Webmasters - Nairaland

Nairaland Forum / Science/Technology / Webmasters / Ongoing Malware Attack Targeting Apache Hijacks 20,000 Sites (932 Views)

Twitter Ads Targeting Nigeria / Explain Re-targeting In Simple Terms / Joomla Error: Ssl-error-rx-record-too-long-and-apache-ssl (2) (3) (4)

(1) (Reply)

Ongoing Malware Attack Targeting Apache Hijacks 20,000 Sites by Nobody: 8:11pm On Apr 02, 2013
While reading my tweets, i read this article on how apache server which acts as server to very many popular sites like seagate and LA times, has a malware called deadleech. And i thought of our own nairaland, is it running on apache server? Hope their defence is intact against this malware!
Tens of thousands of websites, some operated by The Los Angeles Times , Seagate, and other reputable companies, have recentlycome under the spell of"Darkleech," a mysterious exploitation toolkit that exposes visitors to potent malware attacks.
The ongoing attacks, estimated to have infected 20,000 websites in the past few weeks alone, are significant because of their success in targeting Apache, by far the Internet's most popular Web serversoftware. Once it takes hold, Darkleech injects invisible code intowebpages, which in turn surreptitiously opens a connection that exposes visitors to malicious third-party websites, researchers said. Although the attacks have been active since at least August, no one has been able to positively identify the weakness attackers are using to commandeer the Apache-based machines. Vulnerabilities in Plesk, Cpanel, or other software used to administer websites is one possibility, but researchers aren't ruling out the possibility of password cracking, social engineering, or attacks that exploit unknown bugs in frequently used applications and OSes.
Researchers also don't know precisely how many sites have been infected by Darkleech. The server malware employs a sophisticated array of conditions todetermine when to inject maliciouslinks into the webpages shown to end users. Visitors using IP addresses belonging to security and hosting firms are passed over, as are people who have recently been attacked or who don't access the pages from specific search queries. The ability of Darkleech to inject unique links on the fly is also hindering research into the elusive infection toolkit.
"Given that these are dynamically generated, there would be no viable means to do a search to ferret them out on Google, etc.," Mary Landesman a senior security researcher for Cisco Systems' TRAC team, told Ars. "Unfortunately, the nature of the compromise coupled with the sophisticated conditional criteria presents several challenges."
The injected HTML iframe tag is usually constructed as IP address/hex/q.php . Sites that deliver such iframes that aren't visible within the HTML source are likely compromised by Darkleech. Special "regular expression" searches such as this one helped Landesman ferret out reported iframes used in these attacks. Note that while the iframe reference is formed as IP/hex/q.php , the malware delivery is formed as IP/hex/hex/q.php .
In active development
With the help of Cisco Security Engineer Gregg Conklin, Landesmanobserved Darkleech infections on almost 2,000 Web host servers during the month of February and the first two weeks of March. The servers were located in 48 countries, with the highest concentrations in the US, UK, and Germany. Assuming the typical webserver involved hosted an average of 10 sites, that leaves the possibility that 20,000 sites were infected over that period. The attacks were documented as early as August on researcher Denis Sinegubko's Unmask Parasites blog. They were observed infecting the LA Times website in February and the blog of hard drive manufacturer Seagate last month, an indication the attacks are ongoing. Landesman said the Seagate infection affected media.seagate.com, which was hosted by Media Temple , began no later than February 12, and was active through March 18. Representatives for both Seagate and the LA Times said the sites were disinfected once the compromises came to light.
"I regularly receive e-mails and comments to my blog posts about new cases," Sinegubko told Ars last week. "Sometimes it's a shared server with hundreds or thousands of sites on it. Sometimes it's a dedicated server with some heavy-traffic site."
Referring to the rogue Apache modules that are injected into infected sites, he added, "Since late 2012 people have sent me new versions of the malicious modules, so this malware is in active development, which means that it pays off well and the number of infected servers can be high (especially given the selectivity of the malware that prefers to stay under the radar rather than infecting every single visitor)."
Landesman picked a random sample of 1,239 compromised websites and found all were running Apache version 2.2.22 or higher, mostly on a variety of Linuxdistributions. According to recent blog posts published here and here by researchers from security firm Securi, Darkleech uses rogue Apache modules to inject malicious payloads into the webpages of the sites it infects and to maintain control of compromised systems. Disinfecting Web servers can prove extremely difficult since the malware takes control of the secure shell (SSH) mechanism that legitimate administrators use to make technical changes and updatecontent to a site.
"We have noticed that they are modifying all SSH binaries and inserting a version that gives them full access back to the server," Securi CTO Daniel Cid wrote in January. "The modifications not only allow them to remote into theserver bypassing existing authentication controls, but also allow them to steal all SSH authentications and push it to theirremote servers."
Researchers from a variety of other organizations, including antivirus provider Sophos and the Malware Must Die blog , have also stumbled on servers infected by Darkleech. They note the third-party attack sites host malicious code from the Blackhole exploit kit , a suite of tools that targets vulnerabilities in Oracle's Java, Adobe's Flash and Reader, and a variety of other popular client software.
"It looks like the attackers were beforehand well-prepared with some penetration method to gain web exploitation which were used to gain shell access and did the privilege escalation unto root," the writer of the latter blog post wrotelast week, adding that he wasn't atliberty to discuss the precise method. "Since the root [was] gained in all infected servers, there is no way we can trust the host or its credentials anymore."
The writer went on to recommend that admins take infected servers offline and use backup data to reinstall the software. He also suggested that users take care to change all server credentials, since there's a strong chance all previous administrator logins have been compromised.
Déjà vu
The Apache server compromise in many ways resembles a mass infection from 2008 that also used tens of thousands of sites to silently expose visitors to malware attacks. The challenge white hats often face in fighting these hacks isthat each researcher sees only a small part of the overall damage. Because the server malware is designed to conceal itself and because so many individual systems are affected, it can be next to impossible for any one person togain a true appreciation for the scope of attack.
Since there's not yet consensus among researchers about exactly how Darkleech takes hold of infected systems, it's still unclear exactly how to protect them. And as already noted, disinfecting systems can also prove challenging since backdoor and possibly even rootkit functionality may allow attackers to maintain control of servers even after the malicious modules are uninstalled.
"This is a latent infection," Sinegubko wrote. "It hides from server and site admins using blacklists and IPs and low-level server APIs (something that normalsite scripts don't have access to). "Ithides from returning visitors. It constantly changes domains so youcan't reduce it to the facts were some particular domain was involved. I'm still waiting for someone to share any reliable information about the attack vector."
Story updated to add details about Blackhole.
Re: Ongoing Malware Attack Targeting Apache Hijacks 20,000 Sites by Nobody: 8:18pm On Apr 02, 2013
Re: Ongoing Malware Attack Targeting Apache Hijacks 20,000 Sites by Nobody: 8:37pm On Apr 02, 2013
One thing that caught my attention was that this malware damaged linux apache in 2weeks! Fortunately, i learnt that anti virus are able to identify such malware. Read here http://malwaremustdie..com/2013/03/the-evil-came-back-darkleechs-apache.html

(1) (Reply)

I Need Constructive Criticism- THREAD CLOSED / Difficulty Publishing Post On Wordpress / Squeeze And Sales Page Set Up

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 32
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.