doc_strange: (Agamotto sleeping)
With the recent surge in mass email "worms" that spoof sender addresses, I (and many others, of course) have been seeing a ton of messages like:

 Your email could not be delivered because it contained the virus 
   [mass-email virus or worm here] and has been blocked by the [brandname here] 
   oh-so-31337 antivirus gateway about which you can get more information at 
   [slimeball website here]. 


Ok, look: When I test security-related systems, one area I examine is automated response mechanisms. Auto blocking, responsive probes, fingering, whois lookups, email responses, even logging: things an attacker can use with light-weight effort to create larger effects. The accelerant effect, which used to be the key to major DDoS efforts (now it's more doable with botnets), is still key to making someone's life hell. Calling 10 pizza joints and ordering 5 pizzas from each to the victim's house. Sending 1000 small packets to a sucker subnet and getting 200,000 much larger responses sent to the victim. Beating the crap out of victim's DNS server because one 64byte UDP packet spoofed to look like it came from victim and sent to sucker's network generates several DNS requests from sucker to victim for each one little packet you have to send to the sucker...

The idea is simple: attacker does X effort and gets X times Y effect on victim. SO, given a nice long antivirus response, and simple, scripted SMTP attacks that inject, over and over, spoofed letters reporting to be from [victim], with simple, small antivirus triggers (like the EICAR test signature-trigger, even)... one can merrily have a disproportionate impact.

Not to mention that it makes these fricking worm outbreaks that much more of a pain in the ass.

Antivirus vendors, take heed:
Only internal users should be notified when their own, outbound mail is blocked for having a virus. Oh, and the local admins can get the info from the console if someone wonders whether a letter went missing. There are millions of emails PER HOUR being spoofed by worms now; no need to make things worse by sending along your "blocked!" message to some poor person who is already a victim because their address has been used by some slimy mass mailing worm.

Or does your marketing department consider these messages to be good advertising? Hint: If so, it's spam.
doc_strange: (Savoir Faire!)
[Jaws narrator]Just when you thought it was safe to go back to the Internet...[/Jaws narrator]

Welchia B



New: Random seeding that actually works!
New: MS03-049!
New: All HTTP file transfer!

But wait! There's MORE!

Yes, it's NEW, IMPROVED! It whitens your harddrive! It cleans your ports! It's Welchia C!
New: Er, something or other!



Good lord. Fricking patch your fricking hosts.
doc_strange: (Agamotto sleeping)
"The rabbi also said that if the police do not use pig fat in buses, tens of thousands of ultra-Orthodox Jews will arm themselves with spray guns filled with liquid lard, which they will spray on terrorists whenever the need arises."

Oh. Kay.

http://www.maarivintl.com/dev/index.cfm?fuseaction=article&xCache=%7Bts%20%272004%2D02%2D14%2005%3A59%3A22%27%7D&articleID=2833

NO, really.

I had not thought things were desperate enough that the ridiculous had become reasonable.
Either:
1) Maariv got owned/bamboozled/scammed, or
2) A fringe piece has been reported as mainstream, or
3) Papal[1] -- er, Rabbinical -- dispensation goes a loooong way.

Dang. It reminds me of the "Israeli army coats rubber bullets with pork" disinformaton campaign from a few years ago. But... it's reported in mainstream Israeli press. Desperation or farce?

[1] Papal, not Paypal, you geek, you.
doc_strange: (Default)
Several papers reported on the apparent infiltration of Democratic Senators' files by Republican counterparts on the Judiciary committee. Apparently, the discovery of the infiltration was the result of an investigation by the Senate Sergeant-at-arms into how certain memos got leaked back in November. The New York Times had a pretty straightforward article on it on Friday.

What's particularly interesting to me is the assertion that there was "no hacking" involved. Note the spin control of preemptively declaring that "hacking' (a vague term in and of itself) was not involved. Now, unless the Senators' documents were on an utterly open file share, I just don't see how that would be the case. Are you offended that an action that would get a 16-year-old with only joy-riding intentions 5-10 years is being discussed only in "ethics" terms? I sure am. Heck, we have about -><- that much actual technical information on what happened.

A discussion of what might actually be going on, from a computer forensics standpoint )
doc_strange: (Savoir Faire!)
A number of co-workers and clients have been struggling this year to come up with a way to wish people "Season's Greetings" or the like, and also to celebrate with appropriate symbols to everyone. I'm more of a "give everyone the ability and space to make their own proper statements" type, myself. However, in light of this apparent need for a truly multicultural celebratory event, I've come up with:

Multicultural December Solstice-ish seasonal event celebration instructions. )

It's sure to please or offend all in equal portions.
[edited 13:18]
doc_strange: (Default)
Many clients of ours have been reporting a significant change in the rate of "spam" volume growth (in this case, unsolicited commercial email, mass-mailing worms, and the like) over the last two months. Some, who keep excellent records of filtered, accepted, and rejected mails, have been sharing their email growth numbers with us.

Long discussion about what's about to happen with Internet-based, SMTP email. )
doc_strange: (Agamotto sleeping)
On accurate terms, political wrangling, and what most of us already realize, Part 2. )
doc_strange: (Agamotto sleeping)
[livejournal.com profile] weds wrote recently:

". . . not only does "Indians and Eskimos" strike me as a sort of acceptable racism here, it pushes imprecision buttons." The other person asked her whether her preference for another term was a political correctness move.

On accurate terms, political wrangling, and what most of us already realize, part 1. )

Book idea.

Aug. 26th, 2003 06:40 pm
doc_strange: (Savoir Faire!)
In true Al Franken style, I'm thinking of writing a book called, "Crappy, Insecure Network Security Products, and the Asswipes that Sell them to Clueless Suckers Working Jobs for which they are Unqualified, an unbiased look at the information security marketplace."

Based entirely on personal experience, I'm sure it would sell well.
doc_strange: (Default)
The worm world is not seeing continuous improvement. Ok, probably overstated. There's always lame releases of software even if the trend is upwards.

Long discourse on noisy or 'loud' worms vs. more quiet wormish programs )

That said, there's fresher and fresher worms taking advantage of vulnerabilities made public over the last six months, and to top off a bad week, M$ released two new advisories. One is for rollup addressing a suite of Internet Explorer bugs (one of which is so bad, merely visiting a naughty web page can leave your computer backdoored to heck and back). With the reigning "tweak Microsoft's nose" mood, these don't bode well.
doc_strange: (Default)
Well? Where is it? I make a joke about the hole being so blatantly unpatched still despite all the noise, that someone ought to write a worm to patch it, and within 48 hours this happens.

Add to it that, when MS0-026 came out, it was obviously a problem calling for a worm. Loudly. When I wrote up the advisory for a client's internal service delivery (ops) staff, we said the patch timeline should be: ASAP for critical infra and border hosts, Aug 1 for all servers and as many laptops as you can get, and Aug 8 to wrap up desktops and everything else. On Aug 11, the worm showed up.

Now I wonder when the prediction about an MS03-030/MS03-026 combo hole worm will come out. If it does, it will be veri nasti.
doc_strange: (Default)
...is to not be anywhere?

In a not even vaguely bold move, Microsoft went and pulled all DNS for windowsupdate.com. They indicate how it's a smart move.

What they don't tell you is that the worm, given NO IP address to attack... will flood 255.255.255.255 -- a broadcast address, causing it to wreak more havoc on the infected system's segment than it would have before.

SO:
1) MS has a hole for years in their now heavily-code-reviewed software.
2) MS releases a patch and begs everyone to apply it
3) a worm comes out, which will target a DDoS attack at a prominent MS site just 6 days after release
4) MS pulls their address so the worm beats the daylight out of the local victim's network.

THANKS Microsoft!

Countdown

Aug. 14th, 2003 09:38 pm
doc_strange: (Agamotto got nothing on this.)
Shameful to say, I had to pull up a timezone map to figure out that... at 7AM Central time US, tomorrow, NZ will see the MSBlaster worm kicking off its flood at the windowsupdate.com website.

Upshot: companies with "just a few" infected hosts will see those hosts pound TCP SYN traffic at port 80 on windowsupdate.com as fast as they can. A single host can flood out a 100M ethernet segment, and ergo, just about any company's ourbound Internet capacity.

If you hadn't found all the infected hosts in your enterprise... you'll sure find them now.

Clever trick #1 that a number of people have discussed: The worm uses DNS to look up windowsupdate.com (which is, after all, dynamically load-balanced geographically with variable IP)... so no escape for MS -- Mr. Worm will find them yet! The clever trick is that companies with their own *internal* DNS can set up *.windowsupdate.com to resolve to 127.0.0.1. Infected hosts will just beat on themselves, causing no disruption.

The wave of worms activating their DoS mode will be highly reminiscent of the Y2K watch on new year's eve. Let's hope it's as uneventful.
doc_strange: (Agamotto got nothing on this.)
Wormity worm.
The LoveSAN/MSBlaster worm is actually rather a dull one. One vector, and pretty trundled together.
There's a lot of technical info about the RPC/DCOM worm. )
Just about on schedule, if you consider that the folks I work with said, "Get all servers patched by the 3rd, and all laptops by or around the 6th, and the desktops by the 11th."

Everyone saw this coming.

Still, it is spreading fairly far. Indeed, the news reports are not based on the real number of infections out there (would your employer run to CNN and yell, "Yeah, we wurz warned, but we dinna listen, and now we hozered!"? Didn't think so).

In reality, I've heard from large financial and insurance with just a couple dozen hozed laptops or remote user systems, while also hearing from a large manufacturing company of hundreds (and going rapidly up) of affected hosts. One company said it was just not a big deal; after all they "only" had 400 or so affected hosts.

One division of one company I know seemed to become suddenly, wildly infected (the network guru noticed when his virus protection software told him it had blocked the worm exe from running -- meaning he was vulnerable, and that close to being hozed). They started talking about cutting their corporate WAN connection to prevent infecting the rest of the company. Then they sheepishly admitted their patching might be a little behind... despite THREE WEEKS of warning... and two weeks of the corporate core performing upgrades on *20,000* hosts.

"Well it would have been disruptive to business." Yeah. Corporate core's 20,000 host upgrade was totally painless, you betcha!

Anyhow, they're living with their risk assessment results now.
doc_strange: (Agamotto got nothing on this.)
http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.cirebot.html

Yeah, that turned out to be... nothing but an older lolol pseudo-worm with a new sploit and scanner loosely cooked into the package using a VB program. Waste of time in many senses.

But, it's a step in the [your adjective here] direction.

Tick... tick... tick...
doc_strange: (Savoir Faire!)

Or,



What I did on your summer vacation.



Oh-kay. So now even CNN has a story on the likely wormage. The client at which I'm working is probably 5-7 days ahead of most companies in addressing the most recent MS vulnerability issues. They are coordinately performing triage, seeking to escape the potential damage wave. Great! But everyone's working 12-hour shifts to patch... oh, 1000 or so servers, and 10,000+ user systems.

So, with our staff exhausted, working overtime to deal with little issues (like one of the critical patches *can't* be installed except by hand), it didn't really help when our Microsoft rep missed the status call yesterday, because he and the rest of the local MS team went to a baseball game.

No, really.

What arrogance.

Our VP of systems asked MS when they expected to release an enterprise class operating system, today. No, really.

It's as if using MS products is a small taste of an abusive relationship. *WHACK* Oh, oh, I didn't mean that. *WHACK* Oh, well, I mean you get what you pay for, but so sorry. *WHACK* Oh, well, come on, where else would you go? *WHACK* I mean, you NEED us. *WHACK* Oh, quit your complaining. What would you do without us? *WHACK* Hey, no one's perfect... you probably can't even imagine life without us.

Cripes. I'm scaring myself here.

The sheer frustration of dealing with (and paying for) belligerent incompetence upon incompetence is, I begin to believe, a significant drain upon the economy.
doc_strange: (Agamotto got nothing on this.)
Well, finally someone had to say it. It's like a bad fantasy story about a prophecy soon to come true. In discussing whether it would be feasible to make a worm... H. D. Moore essentially flat out said how a really nasty worm would work with some choice quotes thrown in for fun. Ok, yes, yes, it's a full disclosure list, and we all already knew that a multivector worm is more likely to get behind a corporate firewall (see, for example, Nimda)... but somehow putting it in print seems a weirdly necessary step on the road to wormage. "Necessary," as in, "someone had to do it." I almost think he must have felt compelled to just . . . SAY IT.

Someone also tossed in some nice offset info for the masses. Yes, fun, fun for everyone.

It's a dance with an obvious end; all are caught up in it and to everyone's horror, it's going straight to the most extreme conclusion, with a packed audience of the horrified and enthralled looking on.

Meanwhile, it turns out the "other" major Microsoft patch (for MS03-030) cannot be applied automatically via a commercial patch update system or via SMS. Oh, GEE... THANKS, MS! I'm sure your large customers are just HAPPY to have to hand-patch 4500+ desktops. Yoooobetcha!

Ok, ok... MS DID cave in and make a "special version" for at least one client. Er, ok... so, um, what (anticompetitive?) purpose did the non-automatable one serve?
doc_strange: (Agamotto got nothing on this.)
Attacks using the new RPC/DCOM hole are picking up in frequency and volume. So much, one Uni says they will start pulling vulnerable systems from their net. Not COMPROMISED systems... VULNERABLE systems. I.e., "Oh, you didn't patch this week? No worry. We'll just undo your network connection RIGHT HERE [*CRUNCH*]...."

Small wonder, though. There's exploits out in source, one with a menu so you don't even have to think about the target system offset value. Heck, there's a precompiled Windows32 app version of the 'sploit. Point and drool system breakin. It's like a feeding frenzy; h4x0r r10t0Rz l00T1n.

Wonder what I'm talking about? Ok, here's an easy way to tell if your system is open to the vulnerability announced in MS03-026:

Q: Running Windows NT4, 2000, XP, or 2003?
a) No? Not vulnerable.
b) Yes? It's vulnerable...

...unless you patched recently specifically for the hole, or you're running personal firewall software (in which case, your box still has the hole, but is reasonably protected if the FW is set up correctly).

Oh, MS suggested a "workaround" -- turn off DCOM, a "workaround" that breaks Acrobat, Excel, and many other applications. "Gee, Thanks!"

Wonder what I'm talking about?
Run dcomcnfg (Start->Run->dcomcnfg)
Click "no" a couple times.
Looooook at that list of software you might break by turning off DCOM. "Gosh, great suggestion, Microsoft!"

Alternatively, unplug affected system, and bury head in sand. Hum loudly.

Bore-ing!

Jul. 27th, 2003 05:06 pm
doc_strange: (Savoir Faire!)
Note to self:

When attempting to run fiber down 2 stories in an exterior wall containing vents, fans, electrical conduit, electrical hookup, plugs, switches, and window framing... don't.
doc_strange: (Default)
Waiting.
Waiting for the worm.
MS03-026 smells like freshly turned earth.
There's sure to be one in there.
Coming soon to a theatre of IT operations near you.

It's getting tedious.
Someone put out the thumper.
Page generated Oct. 18th, 2025 08:46 pm
Powered by Dreamwidth Studios