[Infowarrior] - Lazy Hacker and Little Worm Set Off Cyberwar Frenzy

Richard Forno rforno at infowarrior.org
Thu Jul 9 00:12:05 UTC 2009


Threat Level Privacy, Crime and Security Online
Lazy Hacker and Little Worm Set Off Cyberwar Frenzy
	• By Kim Zetter
	• July 8, 2009  |
	• 6:26 pm  |

http://www.wired.com/threatlevel/2009/07/mydoom/
Talk of cyberwar is in the air after more than two dozen high-level  
websites in the United States and South Korea were hit by denial-of- 
service attacks this week. But cooler heads are pointing to a pilfered  
five-year-old worm as the source of the traffic, under control of an  
unsophisticated hacker who apparently did little to bolster his  
borrowed code against detection.

Nonetheless, the attacks have launched a thousand headlines (or  
thereabouts) and helped to throw kindling on some long-standing  
international political flames — with one sworn enemy blaming another  
for the aggression.

Welcome to the New World Order of cybersecurity.

As reported by numerous media outlets this week, websites belonging to  
the White House, Department of Homeland Security, U.S. Secret Service,  
National Security Agency, Federal Trade Commission, Department of  
Defense and the State Department, as well as sites for the New York  
Stock Exchange and Nasdaq were hit by denial-of-service attacks over  
the July 4th holiday weekend. The Washington Post website was also  
reportedly affected by the attacks, launched by a botnet of more than  
50,000 computers in several countries (mostly China, South Korea and  
Japan, according to Whois records) controlled by the hacker.

Then on Tuesday, at least 11 sites in South Korea, including sites for  
the Ministry of Defense and the presidential Blue House, were also  
targeted, leading the Associated Press to publish a story prominently  
quoting anonymous South Korean intelligence officials blaming the  
attacks on North Korea.

Security experts who examined code used in the attack say it appears  
to have been delivered to machines through the MyDoom worm, a piece of  
malware first discovered in January 2004 and appearing in numerous  
variants since. The Mytob virus might have been used, as well.

Both programs infect PCs running various versions of the Windows  
operating system. MyDoom is delivered through an infected e-mail  
attachment and was spread through the Kazaa file-sharing network when  
it first came out. Once a user clicks on the attachment, the worm  
roots through the victim’s e-mail contact list and mails itself to  
everyone on the list. The initial malware in 2004 was programmed to  
launch a denial-of-service attack against a site for the SCO Group,  
which had filed an intellectual property suit against IBM over its  
alleged use of Linux code. The attack was programmed to launch  
February 1, 2004 and end February 12, sending a request to the website  
every millisecond. MyDoom was considered the fastest-spreading worm at  
the time.

In the recent attack, experts say the malware used no sophisticated  
techniques to evade detection by anti-virus software and doesn’t  
appear to have been written by someone experienced in coding malware.  
The author’s use of a pre-written worm to deliver the code also  
suggests the attacker probably wasn’t thinking of a long-term attack.

“The fact that it’s using older threats isn’t a terribly stealthy  
attack,” says Dean Turner, director of Symantec’s Global Intelligence  
Network. “And the fact that it’s re-using code could indicate that  
somebody put it together in a hurry or that, as with most DDoS  
attacks, their purpose is mostly nuisance. It didn’t require a degree  
in rocket science to pull that stuff together.”

Although he acknowledges that, given the length of time this attack  
has continued, it’s “pretty significant.”

Joe Stewart, a security researcher at SecureWorks says the code he  
examined, which was written in Visual C++, was compiled on July 3, two  
days before the first attacks. Although Stewart says analysis of the  
attack is still in its early stages, he concurs that the attacker’s  
motivation was fairly routine.

“Usually you see a DDoS attack against one or two sites and it will be  
for one of two reasons — they have some beef with those sites or  
they’re trying to extort money from those sites,” he says. “To just  
attack a wide array of government sites like this, especially high- 
profile, just suggests that maybe the entire point is just to get  
attention to make some headlines rather than to actually do any kind  
of damage.”

Denial-of-service attacks are one of the least sophisticated kinds of  
attacks a hacker can launch and have been around for nearly as long as  
e-commerce. But their strength and reach has increased since the  
advent of botnets — where hackers take control of thousands of  
machines by getting users to inadvertently click on files containing  
malware that allows them to remotely control the machines. The hackers  
then use the machines to launch attacks on websites. The only reason  
this one seems to have caught the public eye is because so many  
government sites were targeted at once.

“The breadth of the attack is unusual,” Stewart says.

The malware is designed to contact various servers to obtain new lists  
of targets. The first list had only five targets — all U.S. government  
sites. A second list used by the malware on July 6 had 21 targets, all  
U.S. government and commercial sector sites, including e-commerce and  
media sites. A list on the 7th switched out some of the U.S. sites for  
ones in South Korea. The total number of sites known to be targeted so  
far is 39, Stewart says, although the list could be augmented as the  
days pass.

Not all the sites were crippled by the attack. Most of the U.S. sites  
recovered quickly, but a site for the Federal Trade Commission,  
Department of Transportation and Secret Service continued to have  
problems for a day or more.

The Department of Homeland Security, which oversees the U.S. Computer  
Emergency Response Team, said in a statement that as of last night,  
all federal websites were back up and running. Spokeswoman Amy Kudwa  
also said that US-CERT had issued a notice to federal departments and  
agencies advising them of steps to take to help mitigate against such  
attacks.

“We see attacks on federal networks every single day, and measures in  
place have minimized the impact to federal websites,” she said. “US- 
CERT will continue to work with its federal partners and the private  
sector to address this activity.”


More information about the Infowarrior mailing list