[106655] in North American Network Operators' Group
Re: facebook worm
daemon@ATHENA.MIT.EDU (Gadi Evron)
Thu Aug 7 21:35:38 2008
Date: Thu, 7 Aug 2008 20:35:26 -0500 (CDT)
From: Gadi Evron <ge@linuxbox.org>
To: nanog@merit.edu
In-Reply-To: <Pine.LNX.4.62.0808062335530.14967@linuxbox.org>
Errors-To: nanog-bounces@nanog.org
[top-posting]
Now that this worm has been somewhat balked, I'd like to thank the
membership for your patience with this off-topic post. I realize it is
probably as annoying to some as it was useful to others.
My thinking was that on the rare occasion when we can anticipate
*possible* and *serious* floods and bottle-necks at ISP tech-support
lines, across multiple providers and regions, we should share that
information. NANOG remains the best place for such information
sharing.
While I realize this mailing list is mostly about network operations and
less about ISP operations, we had a discussion in the past where we have
seen some in our community do use this information effectively and find
it useful.
This is a rare occasion indeed, but an explanation and an apology were in
order.
Thank you,
Gadi.
On Wed, 6 Aug 2008, Gadi Evron wrote:
> Hi all. You may want to be ready for a *possible* support lines flood today.
>
> Yesterday I discovered a fast-spreading facebook worm. It spreads by sending
> messages to all your facebook friends, from your account, asking them to
> click on a link in the .pl ccTLD.
>
> This worm is somewhat similar to zlob, here is a link to a kaspersky paper on
> a previous iteration of it, they call it koobface:
> http://www.kaspersky.com/news?id=207575670
>
> The worm collects spam subject lines from, and then sends the users personal
> data to the following C&C:
> zzzping.com
>
> I spoke with DirectNIC last night and the Registrar Operations (reg-ops)
> mailing list was updated that the domain is no longer reachable. That was
> very fast response time from DirectNIC, which we appreciate.
>
> The worm is still fast-spreading, watch the statistics as they fly:
> http://www.d9.pl/system/stats.php
>
> The facebook security team is working on this, and they are quite capable.
> The security operations community has been doing analysis and take-downs, but
> the worm seems to still be spreading.
>
> All anti virus vendors have been notified, and detection (if not removal)
> should be added within a few hours to a few days.
>
> For now, while users may get infected, their information is safe (unless the
> worm has a secondary contact C&C which I have not verified yet).
>
> It seems like some users may have learned not to click on links in email, but
> any other medium does not compute.
>
> Gadi.
>