[nflug] Mass attack on Apache servers can be stopped: SecureWorks
Robert Wolfe
robert at wolfe-n-wolfe-enterprises.com
Fri Jan 25 13:59:41 EST 2008
Security vendor SecureWorks reported this week that the mass attack
launched against Apache web servers running on the open-source Linux
operating system can be thwarted by disabling dynamic loading in the
Apache configuration.
The attack, originally thought to have impacted several hundred websites,
actually has infected about 10,000 websites, including some in the United
States but mostly in the United Kingdom and India, according to
SecureWorks.
The compromised websites, mostly hobby and travel sites without security
administrators to keep them updated, can infect their visitors with
malicious JavaScript code that can steal a variety of personal
information, including bank user names and passwords, Social Security and
credit card numbers and online payment accounts, according to SecureWorks.
The malicious JavaScript takes advantage of flaws in QuickTime and a host
of other applications and services, including SuperBuddy and Yahoo
Messenger's GetFile, SecureWorks researchers said.
According to the Atlanta-based managed security service provider, the
exploits install a copy of Rbot and other malware on Apache servers. These
are typically large files in the 144 KB to 433 KB range, and are "packed"
in a way that avoids alerts for suspicious use of packets, tools that
compress and scramble code in executable files.
SecureWorks says that organizations can protect against this attack by
disabling dynamic loading in their Apache module configurations. The
manner in which the perpetrators have injected their code into Apache
servers is "very clever," Jon Ramsey, SecureWorks chief technology
officer, told SCMagazineUS.com.
"[The code-injection process] changes the behavior of the Apache server
to deliver malware content," he said.
Visitors to infected websites can avoid infection by ensuring their
anti-virus signatures are up to date and that they have patched all
vulnerable software. The attack does not take advantage of any unknown or
zero-day vulnerabilities, SecureWorks added.
SecureWorks has yet to pinpoint exactly who the attackers are, Ramsey
said.
"The attacks do not match any typical attack patterns from any of the
well-known Russian or Chinese groups," SecureWorks said in a prepared
statement. "Some signs [indicate it is] Western European or even North
American in origin."
"We have some interesting clues about where the group or person may be
from, but no definitive information," Ramsey said.
More information about the nflug
mailing list