Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Development

    MySpace Worm Uses Fast-Flux to Dodge Detection

    Written by

    Lisa Vaas
    Published July 28, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A complex attack that in June was discovered to be turning MySpace.com users sites into bots to serve phishing scams and viruses is just one example of fast-flux: a new way of hiding phishing and malware delivery sites behind ever-shifting networks of proxy servers that are next to impossible to track down, security experts have said.

      In late June, some MySpace user pages were seeded with malware designed to exploit one of three recently patched security holes in Windows and Internet Explorer. The exploit started with a Flash movie installed on multiple compromised MySpace pages that led users to a spoofed MySpace log-in page. That log-in page hosted a number of exploits that downloaded malware and tried to snatch visitors MySpace credentials.

      Once the botnet commanders secured a MySpace users credentials, they then updated the users site to host malware. ScanSafe estimates that almost 100,000 MySpace accounts were compromised.

      This MySpace botnet in particular reflects a leap in the evolution of bot architecture.

      Old-school bot networks were set up with compromised machines at the beck and call of a command-and-control computer—one able to send commands to the botnets individual, compromised, zombified systems.

      Those traditional botnets, still around and still constituting what experts call a malware pandemic, have traditionally used IRC (Internet Relay Chat) to communicate. Once security experts and law enforcement tracked them down, they could shut them down in a relatively straightforward manner.

      Fast-flux networks, on the other hand, come with a new layer of abstraction. Now, machines are getting compromised and used merely as frontline proxies, with the botnet commanders safely tucked away behind a veil of constantly shifting IP addresses.

      In fast-flux, the IP address that security experts can track down in investigation belongs only to a PC thats been compromised. That PC is merely acting as a proxy, with stolen data located elsewhere. The proxy contains no logs, no data and no files that can give away the crimes for which it is actually being used.

      The really sneaky part comes in fast-flux botnets use of domain names. Borrowing the same techniques used by legitimate companies for load-balancing and resiliency, fast-flux botnets are using IP addresses that change dynamically.

      This makes it practically impossible to find and shut down the botnets, according to Dan Nadir, vice president of product strategy at ScanSafe, in San Mateo, Calif.

      “Bad guys will register badguy.com and the IP addresses that are being used as you resolve badguy.com actually change dynamically,” he said. “You could do a lookup 1,000 times for the record for badguy.com, and it could resolve to 1,000 different PCs. You dont have a one-to-one relationship. … As you start to tear down the network to find badguy.com, you work to take it down, and it doesnt matter, that address is resolving to another PC, and it goes on and on.”

      The pilfered data now sits hidden behind a proxy server. The fast-flux botnet may have hundreds of frontline servers, geographically dispersed worldwide.

      /zimages/1/28571.gifClick here to read about how MySpace handles its infrastructure challenges.

      From what security experts can detect, command and control has shifted from IRC to what appears to be pure HTTP with fast-flux. If a victim clicks on a spam message or phony MySpace message, the link points to a domain owned by the malware author. When a victim clicks on the link, at that moment in time his or her PC is directed to connect to the malware authors domain. That will give the target system the IP address of a frontline proxy server, which in turn connects to yet another compromised PC that sits behind it.

      The process, like all serious, profit-motivated contemporary malware, is silent. All a victim would see, in the MySpace worm case, is MySpace—or, at least, a spoofed version of MySpace.

      The shift from IRC isnt necessarily relevant, Nadir said, although IRC does make the process of blocking a botnet command-and-control center “a bit easier.”

      The real benefit to botnet operators, however, is multiple layers and resilience, he said—the shields they have against being blocked.

      “In old networks you could say I have this IP [address], shut it down. … If you could get to the main address, thats resolvable, you could block the connection. Now you cant do that. As many times as you try to shut down the address, it will resolve to another,” Nadir said. “[Meanwhile], name servers are always giving you another IP address. Even name servers are changing. … I see a link that looks like MySpace. I click on it. My machine says I need to resolve fakemyspace.com. DNS [Domain Name System] works like a tree: It goes to the domain that says it owns [a given URL]. … Even those change [in fast-flux]. Youve got the name servers … that change and you get the names theyre giving you changing.”

      The MySpace attack is continuing. ScanSafe, for one, is still seeing cases, he said.

      How to block such a fluid attack is still in question, Nadir said. What ScanSafe does, for example, is to look for signatures of actual malicious code, as well as building reputations of IPs, geographies, URLs and domain names.

      The MySpace fast-flux is terra incognita, however—a land with no static IP addresses, no fixed geographies, URLs that continually change and domain names that slip away before they can be pinned down.

      One way ScanSafe has found to block fast-flux and to at least detect suspicious behavior, however, is to look for DNS and port 80 traffic inbound to the end user name space, given that those just arent neighborhoods where DNS requests usually go.

      “When you see DNS requests going into some Comcast or DNS account, its suspicious,” Nadir said. “Name servers and DNS servers dont usually live out there in user land.”

      The question for users, of course, is how to tell if their systems have been zombified. Desktop software tools vendors vary in their responsiveness, but sooner or later they cough up signatures to detect whatever thumbprint they discover these fast-flux botnets to be leaving.

      Others who sit behind a service such as ScanSafes have the added protection of having their outbound traffic monitored as well. In such a case, command-and-control exchanges issuing over HTTP are an immediate indication that a machine has been compromised, Nadir said.

      At any rate, its not as if the June MySpace fast-flux attack came as a shocker. MySpace has been a handy place to spread malware for some time. Back in 2005 a MySpace user created a worm—detected by Panda Software under the name of MySpace.A—that allowed him or her to stuff 1 million entries into the users contact list.

      That was just a nuisance, though, compared with the first serious MySpace infection, which occurred at the end of 2006. At that time, a worm spread via user profiles, infecting anybody who visited a certain user profile.

      Around the same time, a MySpace advertising banner exploited a Windows Metafile vulnerability to infect over 1 million users with spyware. Within days of that incident, a worm was discovered at MySpace that inserted JavaScript into user profiles. When users tried to visit some of those profiles, they were redirected to a Web page that blamed the U.S. government for the 9/11 attacks.

      Yet more serious MySpace-targeted malware came in December 2006 when ID thieves manipulated a feature in QuickTime to launch phishing attacks on the social networking portal.

      That fast-spreading worm exploited the JavaScript support in QuickTime and targeted a MySpace vulnerability to lure users to phishing sites. The double-barreled attack replaced legitimate links on users MySpace profiles with links to malicious sites cleverly masked to look legitimate.

      According to Colin Whittaker of Googles Anti-Phishing Team, what the search giant tracked as an explosive five-fold increase in overall phishing page views beginning in mid-March was mostly due to phishing targeted at MySpace. Indeed, 95 percent of new phishing traffic targeted MySpace.

      Its not that MySpace accounts have monetary value in themselves, Whittaker said. Rather, they can be used as zombies to spread bulletin board spam for advertising revenue, or phishers may attempt to steal financial account information while logged into stolen accounts.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Lisa Vaas
      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×