Feeds

Server-based botnet floods net with brutish SSH attacks

PHP patch laggards to blame

Website security in corporate America

Updated A server-based botnet that preys on insecure websites is flooding the net with attacks that attempt to guess the login credentials for secure shells protecting Linux boxes, routers, and other network devices.

According to multiple security blogs, the bot compromises websites running outdated versions of phpMyAdmin. By exploiting a vulnerability patched in April, the bot installs a file called dd_ssh, which trawls the net for devices protected by the SSH protocol.

“This bot then conducts brute force SSH attacks on random IP addresses specified by the bot herder,” a user blogged here. Indeed, DShield, an exploit-monitoring service maintained by the SANS Institute, shows a six-fold increase in the number of sources participating in SSH scanning from July 24 to August 10, and close to a three-fold jump in the number of targets.

For reasons that remain unclear, the number of sources over the past two days has plummeted, even as the number of targets has dropped only moderately.

Using a distributed network of compromised web servers to perform the brute-force attacks makes a lot of sense from the hacker's point of view. Not only does it save bandwidth and computing costs, but it also allows the attack to remain concealed from potential victims, since each bot makes only a few login attempts before moving on to the next SSH device. The attacks attempt to guess the passwords used to administer websites by trying huge numbers of possible combinations.

In addition to posing a threat to unpatched websites and SSH-protected devices, the attacks are also creating headaches for large numbers of non-vulnerable sites. As Reg readers have pointed out in comments to this article, the flood of requests for admin.php, setup.php and other PHP-related files can have the effect of a denial-of-service attack. The queries often hit sites running Microsoft's IIS and other platforms that have nothing to do with PHP.

One person commenting on this SANS Diary post reports having success in warding off the attacks with DenyHosts, an open source script that pools IP blacklists from more than 70,000 users. A better countermeasure still is to configure SSH devices to use a cryptographic key, something that is orders of magnitude harder to brute-force than a simple password.

It's tempting to say that it's a given, as well, that admins should update phpMyAdmin and other webserver software to the latest secure versions, but the success that miscreants are showing in installing dd_ssh suggests otherwise. The aforementioned links to Malwarecity.com and SANS provide other useful suggestions for detecting and repelling these attacks. ®

This article was updated to add details about the effect on non-vulnerable sites.

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.