[nsp-sec] dlink router worm or dlink compromise leads to infectedPCs?

Rob Thomas robt at cymru.com
Sat Mar 22 13:08:05 EDT 2008


Hi, Don.

This analysis brought to you accompanied by the fine music of Artie  
Shaw and Django Reinhardt.  :)

> After looking at netflow not all of these appear to be involved in  
> the dlink compromise.

We've located the author and here is what we've learned thus far.   
Take it with a grain of salt.

This is based (at least partly) on a new-ish bot and a mod discussed  
on the unkn0wn.eu web site.  We're unable to reach that site  
presently, though the Google cache has a nice snapshot of the main page:

    <http://64.233.167.104/search?q=cache:wduLnrcaBtIJ:unkn0wn.eu/ 
index.php%3Fshow%3Daffiliates+http://unkn0wn.eu/ 
&hl=en&ct=clnk&cd=1&gl=us>

The web site is down due to some Apache problems the miscreants are  
unable to solve.  Technology stinks for us all, it seems.  ;)

Supposedly the Dlink exploit is also available on milw0rm, though it  
isn't clear that these are the same.  The author is dodging that  
question from the masses of eager miscreants.

The author of this bot is selling it for US $200, with all payments  
made through WU (Western Union).  He is selling it vigorously and  
plans to release it to the wider underground soon.  Be ready.

The bot is based at least partially on rxbot and it runs natively on  
the compromised Dlink routers.  The Dlink routers supposedly run  
Busybox.

    <http://www.busybox.net/about.html>

The author lauds the ash shell, wget, and other available commands on  
the vulnerable Dlink routers.  The author very specifically refers to  
his bot as a "nix" (Unix) bot.

The bot has only three capabilities (at present):

    1. Scan
    2. DDoS
    3. Clone flood IRC servers

Some of the miscreants are asking the author to add sniffing  
capability.  Ugh.

Oh, the author thinks that 84.77.0.0/16 is some sort of honeynet.  He  
has at least 1000 compromised Dlink routers there.  He's adding  
between 800 and 1000 bots per hour at present.

The author is coding eagerly and advertising widely.  Why did he  
write it?  To make money.  That's it.  Gotta love the underground  
economy.

I'd expect a lot of this activity.  This one seems new, circa early  
2008-03.  That said, it's really no different than the Cayman love  
back in the day, or the continued interest in Cisco routers.

Thanks,
Rob.
-- 
Rob Thomas
Team Cymru
http://www.cymru.com/
ASSERT(coffee != empty);







More information about the nsp-security mailing list