Home page logo
/

nanog logo nanog mailing list archives

RE: Sobig.f surprise attack today
From: "Irwin Lazar" <ILazar () burtongroup com>
Date: Fri, 22 Aug 2003 12:54:45 -0600


FYI:

------------------------------------------------------------------------
--------
At 1500 GMT, Mikko Hypponen, director of anti-virus research at
F-Secure, told New Scientist that 18 of the 20 internet addresses his
company had identified in the virus had been blocked. "But if even one
machine remains online at the deadline, anything could happen," he
warned.

Hypponen said F-secure had notified the FBI and internet service
providers who run the addresses listed in the worm and said some of the
companies have agreed to temporarily block access to those machines. The
target machines are based in Canada, USA and South Korea. 


Unreachable address


At 1750 GMT, New Scientist ascertained that all but one of the 20
addresses were inaccessible. The 19 unreachable addresses may have been
blocked, or could always have been protected by a firewall.

The last open address is in Toronto, and is provided by the internet
service provider Sympatico. Its spokesperson told New Scientist: "We are
aware of the virus and are working with local law enforcement to
identify the person behind the virus."

A possible reason for deliberately leaving an address open might be to
act as a "honey pot" - an address controlled by the authorities to
observe the worm in action. 

However, the latest analysis of SoBig.F has revealed that even if this
attempt to block access to the 20 addresses is successful, more action
may be needed. Infected machines are programmed to check twice a week at
the same time for new list of servers to contact. This new list could be
delivered via a new virus.
   

The existing list of 20 appears to list Windows PCs belonging to home
users and connected to the internet via always-on, ADSL broadband
connections, says Hypponen. "It is most likely that the party behind
SoBig.F has broken into these computers and they are now being misused
to be part of this attack."

The worm's previous variant, SoBig.E, downloaded a program that removed
the virus itself to cover its tracks, and then tried to steal the user's
network and web passwords.

But the machines infected with SoBig.F will try to connect to port 8998
on one of the hijacked machines. They will transmit a secret 8-byte
code, which will cause the hijacked machines to return a web link to a
site from which the malicious code can be downloaded.

Attempts to discover this target link have so far been foiled, as the
worm's writer used a bogus URL. Experts believe that this link would be
changed to the real one a few seconds before the deadline, too late for
companies to block.  
David Cohen
 
  


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]