Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Mysterious Net traffic Spurs Code Hunt
CNET ^ | 20 June 2003 | Robert Lemos

Posted on 06/20/2003 7:51:25 PM PDT by Hal1950

Worm? Trojan? Attack tool? Network administrators and security experts continue to search for the cause of an increasing amount of odd data that has been detected on the Internet.

Security software firm Internet Security Systems (ISS) on Thursday declared victory, saying that a new hacker tool that scans for paths into public networks was responsible. But many other security professionals--including those at Intrusec, the company that originally tracked down the hard-to-find code--believe that ISS jumped the gun.

The real culprit likely is still out there, said David J. Meltzer, founder and chief technology officer of Roswell, Ga.-based Intrusec.

"It is possible that (the tool's code) is causing some of this traffic," Meltzer said. However, he added, key differences between the data that was captured by security professionals and data created by the code suggest that the hacker tool isn't the original culprit. "That would leave us to believe that there is something out there that is creating the (data) packets that isn't this Trojan."

However, the security researcher hastened to add that the traffic seen by network administrators isn't ominous. It merely has piqued the curiosity of quite a few researchers.

"I don't think it is a serious threat because it's not self-replicating," Meltzer said. "And it hasn't caused serious disruptions to anyone."

Since mid-May, security researchers and network administrators have tried to track down the source of odd traffic that they have been seeing on their networks. The data frequently attempted to connect to nonexistent servers or to services not offered by existing servers. The only common thread seemed to be that the data packet had a window size of 55,808 bytes and, in many cases, came from a nonexistent Internet address.

The window size is a parameter used by TCP/IP networks to specify the amount of data, in bytes, that devices can send without receiving an acknowledgment from the receiver. The parameter, normally set by the operating system, can make a network more reliable, if set to a lower number of bytes, or faster when long delays are present, if set to a high number of bytes. Typically, when first connecting to another computer, a device on the Internet will use a lower window size--say, 1,024 bytes.

"None of the operating systems are going to start with a window size of that (55,808 bytes) size," said Joe Stewart, senior intrusion analyst with managed security service provider LURHQ (pronouced "lurk"), who also did a significant amount of analysis on the strange traffic.

In late May, Stewart detected a computer trying to connect to a nonexistent computer on the company's network. The only problem with the traffic was that its supposed source was from an Internet address that couldn't exist; the Internet Assigned Numbers Authority, or IANA, had reserved the block of addresses that contained the number, so no Internet router would have forwarded such data. While such an Internet address in the source field of a data packet will often be transmitted by less vigilant Internet service providers, almost no provider would forward data that had such an address in the destination field. So, while the analyst had seen more than 900 such attempts to connect to a server on his network, he could not track the data back.

"It could be a broken scanner or someone trying to map the address space," Stewart said. "I don't think people have really nailed down what was the source of this."

ISS believes the code given to the company by Intrusec is responsible.

"We feel that a significant portion of the traffic is caused by this code," said Dan Ingevaldson, engineering manager for ISS's incident response team. Previous traffic that doesn't match the current code's data patterns may have been caused by an earlier variant of the code, he said.

Theories abound about what the code does. Some people initially believed the data was sent by a worm that used the Internet relay chat (IRC) system, a precursor to the popular instant-messaging networks, to communicate. Others thought that the data had been a low-level denial-of-service attack. Security firm Network Associates classified the code as a worm, which it dubbed W32/Randex.c.

However, the most current theory based on analysis of the code seems to indicate that what Intrusec found is a scanner and attack tool that communicates by sending out information to random addresses hoping that another computer infected with the program would be at the other end. The code has so many bugs, however, that it hasn't worked properly.

"It is very buggy," Ingevaldson said. "It didn't even write information to its data file correctly."

Even if it didn't have flaws, the program would have a tough time working. While it hides the location of the sender and receiver, the technique of broadcasting out data to essentially anybody on the Internet is inefficient at best.

LURHQ's Stewart believes the code that has been found is a research effort by some anonymous would-be attacker. However, he's not so sure that something else isn't out there.

"Until someone comes up with analysis that matches what I am seeing, I'm going to wait," he said.


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Extended News; Foreign Affairs; News/Current Events
KEYWORDS: computercode; computerhackers; krusgnet; techindex; w32randexc
Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 06/20/2003 7:51:26 PM PDT by Hal1950
[ Post Reply | Private Reply | View Replies]

To: Hal1950
sorry but technically, this smells like morons with new tools that don't know what they are doing.
2 posted on 06/20/2003 7:57:35 PM PDT by CJ Wolf
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hal1950
I think this stuff is hitting my commercial installation. And it has been clogging the system.
3 posted on 06/20/2003 7:59:55 PM PDT by FastCoyote
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hal1950
These strange packets must be Neo running around the Matrix.
4 posted on 06/20/2003 8:03:56 PM PDT by nhoward14
[ Post Reply | Private Reply | To 1 | View Replies]

To: CJ Wolf
it's orrin !!

5 posted on 06/20/2003 8:10:24 PM PDT by glock rocks (shoot fast. shoot straight. shoot safe. practice. carry. molon labe)
[ Post Reply | Private Reply | To 2 | View Replies]

To: nhoward14
Jimmy Hoffa!
6 posted on 06/20/2003 8:33:14 PM PDT by Atchafalaya
[ Post Reply | Private Reply | To 4 | View Replies]

To: Hal1950
I suspect in time, someone with a disassembler will be able to figure out what this code is up to.

Imagine, though, that we were all using Palladium machines. Where would we be then?

7 posted on 06/20/2003 8:36:05 PM PDT by supercat (TAG--you're it!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hal1950
Hacker Found!!

Helen the Hacked.
An ugly development...origin unknown

8 posted on 06/20/2003 8:47:00 PM PDT by this_ol_patriot
[ Post Reply | Private Reply | To 1 | View Replies]

To: this_ol_patriot
Helen the Hacked.

LOL. But I would point out that they are looking for a hacker, not a hack.

9 posted on 06/20/2003 9:08:02 PM PDT by Rocky
[ Post Reply | Private Reply | To 8 | View Replies]

To: Hal1950
Verrrry inneresting.
10 posted on 06/20/2003 9:14:45 PM PDT by Ciexyz
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hal1950
"When the Borg come, they'll come in force. They don't do anything piecemeal"

Maybe a "outsourced IT worker"?
11 posted on 06/20/2003 9:34:21 PM PDT by BiffWondercat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hal1950; blam
Mysterious Net traffic Spurs Code Hunt

Maybe the net has gotten complex enough that it is able to support a neural net consciousness and what they're detecting is its thoughts.
12 posted on 06/20/2003 9:49:54 PM PDT by aruanan
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hal1950
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.
13 posted on 06/20/2003 9:58:33 PM PDT by SpaceBar
[ Post Reply | Private Reply | To 1 | View Replies]

To: aruanan
Skynet.....
14 posted on 06/20/2003 10:01:15 PM PDT by Chancellor Palpatine
[ Post Reply | Private Reply | To 12 | View Replies]

To: Hal1950
It must be the "greys" getting revenge for Roswell.

or maybe it is the "father of the internet" (gore)

15 posted on 06/20/2003 10:01:33 PM PDT by ChefKeith (NASCAR...everything else is just a game!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nexus; adam_az; rwfromkansas; Quix; BagCamAddict; Ernest_at_the_Beach; palmer
Ping -- seems to be an update to the earlier thread about the "mysterious trojan horse" article posted in the thread at:

http://www.freerepublic.com/focus/f-news/930838/posts?q=1&&page=51
16 posted on 06/20/2003 10:02:49 PM PDT by FairOpinion
[ Post Reply | Private Reply | To 1 | View Replies]

To: FairOpinion; *tech_index; MizSterious; shadowman99; Sparta; freedom9; martin_fierro; ...
We should have this on the Tech_index list then!

OFFICIAL BUMP(TOPIC)LIST

17 posted on 06/20/2003 11:16:42 PM PDT by Ernest_at_the_Beach (Recall Gray Davis and then start on the other Democrats)
[ Post Reply | Private Reply | To 16 | View Replies]

To: SpaceBar
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.

I think your tinfoil hat is a little tight this morning.
18 posted on 06/21/2003 7:19:53 AM PDT by adam_az
[ Post Reply | Private Reply | To 13 | View Replies]

To: aruanan
AS code is binary, not uni, it finally happened. A "1" mated with a "0" and produced a packet.

It's running around the internet trying to find its mommy.

19 posted on 06/21/2003 9:37:22 AM PDT by happygrl
[ Post Reply | Private Reply | To 12 | View Replies]

To: adam_az
I said:
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.

Then you said:
I think your tinfoil hat is a little tight this morning.


And now I reply:

Well, you might think my scenario is outlandish, and the stuff of conspiricy theories, but this link (washington post) is about a graduate student who, using standard network query tools, mapped a large amount of corporate lan/wan and larger structures on the internet to the degree where US authorities want his thesis kept under wraps since it could be used by terrorists. So? Is my hypothesis really that outlandish? Don't answer, because the answer is evidently "no", and other people in high places seem to think so as well. I don't doubt for a microsecond that all sorts of nefarious groups including criminals, terrorists, and military agencies of foriegn governments are examining every nook and cranny of the net to understand its underlying structure and possible vulnerabilities. So instead of reaching for the increasingly tired tin-foil hat saw, and attempting to discredit the messenger, you might try thinking outside the box instead.
20 posted on 07/08/2003 10:16:47 PM PDT by SpaceBar
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson