Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Major Security Firms Detect New Trojan Capable Of Disrupting Power Plants - Infrastructure
SHTF Plan ^ | 10-19-2011 | Mac Slavo

Posted on 10/19/2011 2:08:07 PM PDT by blam

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-34 last
To: InterceptPoint

Interesting. Check out this link: http://www.f-secure.com/weblog/archives/00001393.html

This has been simmering since around since 2008, but seems to be exactly this type of thing. Very sophisticated, yet simple. Encrypted so it doesn’t have a footprint, residing in sectors on your drive that your OS doesn’t recognize, etc.

This link: http://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html

is also interesting...I really detest the TED people, they are as liberal as the day is long, but this guy, Mikko Hypponen relates some very interesting stuff on viruses, malware and Internet crime.

Very interesting...I highly recommend it, even with the socialist bent at the end where he suggests getting jobs for programmers who haven’t gone criminal yet...(haha, what a laugher THAT idea is)


21 posted on 10/19/2011 5:14:15 PM PDT by rlmorel (9/11: Aggression is attracted to weakness like sharks are to blood, and we were weak. We still are.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: InterceptPoint

I worked in the Microsoft operating system development team for several years. Part of the fun was working with smart foreign nationals from all kinds of interesting places. Sometimes when you got to know them well enough to ask what they did before they came to the US, you could get quite a shock. For example, an ICBM launch officer from USSR. I’ve often wondered how you could ever vet these people adequately.


22 posted on 10/19/2011 5:16:48 PM PDT by c-five
[ Post Reply | Private Reply | To 16 | View Replies]

To: IamCenny; InterceptPoint

Heck, I figured I might as well paste the whole thing in from the first link:

News broke out earlier this year (My Note: this was March 2008) of a new breed of rootkit using techniques never before seen in modern malware. The most notable of them is the fact that the rootkit replaces the infected system’s Master Boot Record (MBR).

The MBR is the first physical sector of the hard drive and contains the first code loaded and executed from the drive during the boot process.

In the competition between rootkits and rootkit detectors, the first to execute has the upper hand. And you can’t execute earlier than from the MBR. Of course, MBR viruses used to be very common in the DOS days, 15 years ago or so. But this is 2008.

This new Windows MBR rootkit launches itself very early during the Windows startup process without requiring any registry or file modifications. In fact, it is quite surprising that it’s possible to write to the MBR from within Windows to begin with.

The MBR rootkit — known as “Mebroot” — is very advanced and probably the stealthiest malware we have seen so far. It keeps the amount of system modifications to a minimum and is very challenging to detect from within the infected system.

Below are some details about the MBR rootkit’s stealth features:

The ntoskrnl.exe module hook that executes the kernel-mode downloader payload is set to the nt!Phase1Initialization function which resides in the INIT section. This means that after the system has initialized the section is wiped out from memory and no sign of the hook is any longer present.

The rootkit stores data that’s required to survive reboots in physical sectors instead of files. This means that the data, including the real payload, is not visible or in any way accessible to normal applications. Therefore the rootkit does not have to hook the normal set of interfaces to keep them hidden.

The MBR is the rootkit’s launch point. Therefore it doesn’t need to make any registry changes or to modify any existing startup executables in order to launch itself. This means that the only hooks it needs to make are used to hide and protect the modified MBR. Essentially this means that the rootkit hooks only two DWORDs from the disk.sys driver object which is shown in the picture below.

Another interesting feature of the MBR rootkit that has not received very much public discussion is its networking layer and firewall bypassing capabilities. One reason for this might be that this part of Mebroot’s code is heavily obfuscated and time consuming to analyze.

It is known that the rootkit’s main purpose is to act as an ultimate downloader. To be stealthy and effective it is essential that the rootkit does not trigger nor is blocked by personal firewalls. It is able to achieve this by operating in the lowest parts of the NDIS layer just above the physical hardware.

Only a single DWORD is hooked at all times from the NDIS internal structures. To send packets the rootkit uses the SendPacketsHandler function implemented by the actual hardware specific driver.

The rootkit uses its own unmodified versions of NDIS API functions it needs to operate. This has been done before by some malware, such as Rustock and Srizbi. However, what we have not seen before is the fact that the MBR rootkit uses a “code pullout” technique to only load the relevant code from the ndis.sys driver instead of loading the whole ndis.sys driver as its private module into memory.

This means that the memory fingerprint of the malware is smaller and there are no additional modules loaded into the system address space which might trigger some forensic tools.

This malware is very professionally written and produced. Which of course means it’s not written for fun. Initial samples from December 2007 and January 2008 were at beta stage. Now it appears that the malware is fully-baked and more active distribution has begun. During the weekend our Security Lab started to receive information about multiple drive-by exploit sites spreading the latest version. (However, at the moment these attacks cannot be considered as widespread.)

The actual site hosting the exploit code utilizes the following exploits:

Microsoft Data Access Components (MDAC) Function vulnerability (MS06-014)
AOL SuperBuddy ActiveX Control Code Execution vulnerability (CVE-2006-5820)
Online Media Technologies NCTsoft NCTAudioFile2 ActiveX Buffer Overflow (CVE-2007-0018)
GOM Player “GomWeb3” ActiveX Control Buffer Overflow (CVE-2007-5779)
Microsoft Internet Explorer WebViewFolderIcon setSlice (CVE-2006-3730)
Yahoo! JukeBox datagrid.dll AddButton() Buffer Overflow
DirectAnimation.PathControl KeyFrame vulnerability (CVE-2006-4777)
Microsoft DirectSpeechSynthesis Module Remote Buffer Overflow

Proof of concept code for two of the exploits was publicly disclosed just less than a month ago.

The downloaded payloads seem to clearly target online banking and other financial systems.

We detect the latest MBR rootkit variant as Backdoor.Win32.Sinowal.Y.
The exploit site is currently resolving to an IP address of 216.245.195.114 and seems to still be active.


23 posted on 10/19/2011 5:19:58 PM PDT by rlmorel (9/11: Aggression is attracted to weakness like sharks are to blood, and we were weak. We still are.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: rlmorel

Thanks for the links. The MBR replacement scheme looks really scary to me. I’m not sure how you deal with that.

And the TED video was quite good. If you watched closely you would have heard him say that they can now embed malware in a .jpg. Click on the .jpg and infect your computer. Yikes.

I like TED despite it’s obvious leftist tilt. Very professionally done. Actually a valuable resource.


24 posted on 10/19/2011 5:40:36 PM PDT by InterceptPoint
[ Post Reply | Private Reply | To 21 | View Replies]

To: InterceptPoint
It was interesting...my brother and I were just discussing this subject last night (before this thread started) and we did some fishing around. (He has run his own PC repair business for nearly the last decade, much of it remediating malware and viruses, so he has done hand to hand combat with a LOT of variations) From what he and I could gather...

NOBODY seems to know what to do or how to deal with this particular kind of thing. (Perhaps some more knowledgeable person on this thread might know a bit more...)

I found that paucity of follow-up information a little disturbing. The key verbiage from that website I thought was this:

The rootkit stores data that’s required to survive reboots in physical sectors instead of files. This means that the data, including the real payload, is not visible or in any way accessible to normal applications. Therefore the rootkit does not have to hook the normal set of interfaces to keep them hidden.

The MBR is the rootkit’s launch point. Therefore it doesn’t need to make any registry changes or to modify any existing startup executables in order to launch itself. This means that the only hooks it needs to make are used to hide and protect the modified MBR.

25 posted on 10/19/2011 5:53:43 PM PDT by rlmorel (9/11: Aggression is attracted to weakness like sharks are to blood, and we were weak. We still are.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: rlmorel

Why can’t they make a removal/replacement software to run during bios pre-boot? Seems likely to me, that if you can detect the malware, you can remove it. Such as off a flash drive, cd, or external hard drive?


26 posted on 10/19/2011 6:14:08 PM PDT by IamCenny
[ Post Reply | Private Reply | To 23 | View Replies]

To: jrd

While initial reports suggested Israel, other reports suggested China or even the United States-—

I dunno, I have a hard time thinking the U.S. would name such a thing as Duqu..but that’s just me..


27 posted on 10/19/2011 6:42:01 PM PDT by Freddd (NoPA ngineers.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: IamCenny

I get the impression that part of the problem is...you cannot detect it.


28 posted on 10/19/2011 6:51:58 PM PDT by rlmorel (9/11: Aggression is attracted to weakness like sharks are to blood, and we were weak. We still are.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: rlmorel

Right, I read that, but that was back in 2008, and if I’m reading correctly this is the same type of malware used years ago when dos was prevalent in Windows OS. So it’s been about 3 years since this article was written and still undetectable? They know enough to know that it’s infected infrastructure software throughout the US but they can’t detect it? I don’t buy it.


29 posted on 10/19/2011 7:31:59 PM PDT by IamCenny
[ Post Reply | Private Reply | To 28 | View Replies]

To: blam; ShadowAce
Instead of directly targeting the SCADA system, Duqu gathers “intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility.”

Doesn't that sound more 'Chinese-like'?

30 posted on 10/19/2011 7:39:31 PM PDT by GOPJ (OWS - a scam to shift blame for unemployment and misery away from Obama..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

31 posted on 10/20/2011 6:29:53 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

32 posted on 10/20/2011 6:30:45 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: blam
There seems to be no immediate danger at this time, as the Duqu trojan is reportedly gathering intelligence

Not dangerous? Really? Information is power. One access code and you're inside and capable of doing anything.

33 posted on 10/20/2011 8:21:22 AM PDT by bgill (There, happy now?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wurlitzer

Symantec stinks. Does nothing but crash and slow things down. Never again.


34 posted on 10/20/2011 8:30:25 AM PDT by bgill (There, happy now?)
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-34 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson