[8109] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Internet Wide DOS Attack using IRC

daemon@ATHENA.MIT.EDU (Samuel Cossette)
Fri Oct 2 22:54:15 1998

Date: 	Fri, 2 Oct 1998 20:55:01 -0400
Reply-To: Samuel Cossette <cluster@VIDEOTRON.CA>
From: Samuel Cossette <cluster@VIDEOTRON.CA>
To: BUGTRAQ@NETSPACE.ORG

I have done my own investigation about it;

First it's not Back Orifice, it's another fuck*** trojan, spread by a DCC
bot on EFnet (#warez950-dcc). When it's installed this is request 3 files on
Geocities! (configuration) After, the trojan start an irc session on EFNet.
The first channel was #^C^CHaVoC^B^B with a key, when they discover the
presence of intruder they have changed the channel (#^_^_HaVoC^B^B) And
since 1-2 weeks the channel is empty and when i start my laptop (infected) I
see, on the monitoring screen of my server, some connection on Geocities
this is retrieve a file and this is return a 404 url not found.

When a clone (Havoc call an infected computer a "Drone") is connected on irc
anybody can control this with Private msg command (.join #chan, .part, .do
[raw command]). 2-3 week ago the infected chan get about 500-700 drones
(stable). My personnal estimation of infected computer it's 15000+.

With 500 "clones" they can easily split an irc server with the command
MOTD :irc.server.net (.do raw command).

To see if you are infected do CTRL-ALT-DEL in windows and if you have a
process called OCE it's the Havoc's trojan :] remove it in your system
directory usualy c:\windows\system

Samuel Cossette

-----Original Message-----
From: dbarba <dbarba@GEOCITIES.COM>
To: BUGTRAQ@NETSPACE.ORG <BUGTRAQ@NETSPACE.ORG>
Date: 2 octobre, 1998 18:09
Subject: Internet Wide DOS Attack using IRC


>   Please forward this on to the appropriate people if necessary.
>
>   GeoCities is currently experiencing a DOS attack that appears to be
>   spread by a trojan horse in a mIRC script.
>
>   GeoCities is receiving thousands of HTTP requests from thousands of
>   unique computers daily for a file that no longer exists on our
>servers.
>   The specific count for one minute on Friday, September 25 at 10:17 am
>
>    was 3,522 hits,
>
>   1,492 of them were from unique IP's.  For the time period of 3 am to
>10:17am
>    on 9/25  we had 3,562 unique IPs request this one file.  It does not
>appear to be
>   specifically requested by the user of that computer.  This request
>uses
>   no browser and is usually requesting the file every 30 seconds while
>the
>   user is connected to the Internet.  The requests are coming from
>around
>   the world and have been slowly building up since at least August 18,
>   1998 (the farthest back our access logs go).
>
>   The attack is requesting a file from our site:
>
>     http://www.geocities.com/Area51/Stargate/5845/nfo.zip
>
>   The complete content of the 5845 directory was:  nfo.zip, nfo.jpg,
>    servers.zip, servers.jpg, users.zip and users.jpg.  When I looked at
>the
>    binary files by doing a cat, the users jpg & zip files were the
>same, but the
>    other files were all unique.
>
>   It does not use a browser or store cookies.  At the moment, the file
>being
>   requested is of zero size.  When there is a file of size , originally
>it was 8k
>   and I later inserted a short note to contact me regarding the attack
>into the
>   nfo.zip file,  at which time the attack becomes much worse on the
>Windows
>    machines that are requesting the file.
>
>   Also, an odd note, there are a couple machines that are requesting
>the file named
>   nfo.jpg.  Those are reqeusted every minute instead of every 30
>seconds.
>
>   I have contacted a user that complained about GeoCities attacking
>him.
>   In reality, his computer was asking for the nfo.zip file from us
>every
>   30 seconds, and that was flooding his connection to the internet.  I
>   have worked with him closely since he found the problem.  He only
>uses
>   IRC.  In fact, the first time he visited our website is after the
>attack
>   started, when he was looking for a contact name and number.  He does
>not
>   surf the internet.  He has subsequently reinstalled his OS and that
>has
>   completely stopped the attack.
>
>   We did find an entry in his registry with the following setting:
>
>   /microsoft/windowsexplorer/doc/find/spec/mru
>   a) " "
>   b) 5845
>   c) nfo
>   d) bo
>   e) nfo.zip
>   f) winrar
>   g) msvbvm60.dll
>   h) loadwc
>   i) stargate
>   j) area51
>   mrulist) eadcbjihgf
>
>    When the user deleted the registry entry, the attack from his
>machine
>   went from 1 GET every 30 seconds to 1 GET every second.  After about
>10
>   minutes, it started slowing up and finally settled into about 1 GET
>   every 17-20 seconds.
>
>    I also asked our ISP to help track some of this and this was their
>result.  "All the IP's
>    I've scanned so far from the log have several UDP ports open in the
>31337 range
>    (what Back Orifice uses)."
>
>   So, we really need to find the source instead of asking everyone to
>   reinstall their OS.  It might also be necessary to inform the various
>
>   virus-detection software vendors to try to eradicate this from all of
>
>   the machines that currently have it installed.
>
>   Thank you for your help,
>
>   Debbie Barba
>   SysAdmin
>   dbarba@geocities.com

home help back first fref pref prev next nref lref last post