Per chi interessato:<br><br><a href="http://www.pcworld.idg.com.au/index.php/id;1081383736">http://www.pcworld.idg.com.au/index.php/id;1081383736</a><br><br>Ciao.<br>Giacomo.<br><br><div><span class="gmail_quote">2007/10/23, Alessio 'isazi' Sclocco <
<a href="mailto:isazi@olografix.org">isazi@olografix.org</a>>:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><br>Parecchi leggono la newsletter di Schneier, pero' questo mi sembra un
<br>articolo piuttosto interessante e da riproporre.<br><br>The Storm worm first appeared at the beginning of the year, hiding in<br>e-mail attachments with the subject line: "230 dead as storm batters<br>Europe." Those who opened the attachment became infected, their
<br>computers joining an ever-growing botnet.<br><br>Although it's most commonly called a worm, Storm is really more: a worm,<br>a Trojan horse and a bot all rolled into one. It's also the most<br>successful example we have of a new breed of worm, and I've seen
<br>estimates that between 1 million and 50 million computers have been<br>infected worldwide.<br><br>Old-style worms -- Sasser, Slammer, Nimda -- were written by hackers<br>looking for fame. They spread as quickly as possible (Slammer infected
<br>75,000 computers in 10 minutes) and garnered a lot of notice in the<br>process. The onslaught made it easier for security experts to detect the<br>attack, but required a quick response by antivirus companies, sysadmins,
<br>and users hoping to contain it. Think of this type of worm as an<br>infectious disease that shows immediate symptoms.<br><br>Worms like Storm are written by hackers looking for profit, and they're<br>different. These worms spread more subtly, without making noise.
<br>Symptoms don't appear immediately, and an infected computer can sit<br>dormant for a long time. If it were a disease, it would be more like<br>syphilis, whose symptoms may be mild or disappear altogether, but which
<br>will eventually come back years later and eat your brain.<br><br>Storm represents the future of malware. Let's look at its behavior:<br><br>1. Storm is patient. A worm that attacks all the time is much easier to<br>
detect; a worm that attacks and then shuts off for a while hides much<br>more easily.<br><br>2. Storm is designed like an ant colony, with separation of duties. Only<br>a small fraction of infected hosts spread the worm. A much smaller
<br>fraction are C2: command-and-control servers. The rest stand by to<br>receive orders. By only allowing a small number of hosts to propagate<br>the virus and act as command-and-control servers, Storm is resilient<br>against attack. Even if those hosts shut down, the network remains
<br>largely intact, and other hosts can take over those duties.<br><br>3. Storm doesn't cause any damage, or noticeable performance impact, to<br>the hosts. Like a parasite, it needs its host to be intact and healthy<br>
for its own survival. This makes it harder to detect, because users and<br>network administrators won't notice any abnormal behavior most of the<br>time.<br><br>4. Rather than having all hosts communicate to a central server or set
<br>of servers, Storm uses a peer-to-peer network for C2. This makes the<br>Storm botnet much harder to disable. The most common way to disable a<br>botnet is to shut down the centralized control point. Storm doesn't have
<br>a centralized control point, and thus can't be shut down that way.<br><br>This technique has other advantages, too. Companies that monitor net<br>activity can detect traffic anomalies with a centralized C2 point, but
<br>distributed C2 doesn't show up as a spike. Communications are much<br>harder to detect.<br><br>One standard method of tracking root C2 servers is to put an infected<br>host through a memory debugger and figure out where its orders are
<br>coming from. This won't work with Storm: An infected host may only know<br>about a small fraction of infected hosts -- 25-30 at a time -- and those<br>hosts are an unknown number of hops away from the primary C2 servers.
<br><br>And even if a C2 node is taken down, the system doesn't suffer. Like a<br>hydra with many heads, Storm's C2 structure is distributed.<br><br>5. Not only are the C2 servers distributed, but they also hide behind a
<br>constantly changing DNS technique called "fast flux." So even if a<br>compromised host is isolated and debugged, and a C2 server identified<br>through the cloud, by that time it may no longer be active.<br><br>
6. Storm's payload -- the code it uses to spread -- morphs every 30<br>minutes or so, making typical AV (antivirus) and IDS techniques less<br>effective.<br><br>7. Storm's delivery mechanism also changes regularly. Storm started out
<br>as PDF spam, then its programmers started using e-cards and YouTube<br>invites -- anything to entice users to click on a phony link. Storm also<br>started posting blog-comment spam, again trying to trick viewers into<br>
clicking infected links. While these sorts of things are pretty standard<br>worm tactics, it does highlight how Storm is constantly shifting at all<br>levels.<br><br>8. The Storm e-mail also changes all the time, leveraging social
<br>engineering techniques. There are always new subject lines and new<br>enticing text: "A killer at 11, he's free at 21 and ...," "football<br>tracking program" on NFL opening weekend, and major storm and hurricane
<br>warnings. Storm's programmers are very good at preying on human nature.<br><br>9. Last month, Storm began attacking anti-spam sites focused on<br>identifying it -- <a href="http://spamhaus.org">spamhaus.org</a>, 419eater and so on -- and the personal
<br>website of Joe Stewart, who published an analysis of Storm. I am<br>reminded of a basic theory of war: Take out your enemy's reconnaissance.<br>Or a basic theory of urban gangs and some governments: Make sure others
<br>know not to mess with you.<br><br>Not that we really have any idea how to mess with Storm. Storm has been<br>around for almost a year, and the antivirus companies are pretty much<br>powerless to do anything about it. Inoculating infected machines
<br>individually is simply not going to work, and I can't imagine forcing<br>ISPs to quarantine infected hosts. A quarantine wouldn't work in any<br>case: Storm's creators could easily design another worm -- and we know
<br>that users can't keep themselves from clicking on enticing attachments<br>and links.<br><br>Redesigning the Microsoft Windows operating system would work, but<br>that's ridiculous to even suggest. Creating a counterworm would make a
<br>great piece of fiction, but it's a really bad idea in real life. We<br>simply don't know how to stop Storm, except to find the people<br>controlling it and arrest them.<br><br>Unfortunately, we have no idea who controls Storm, although there's some
<br>speculation that they're Russian. The programmers are obviously very<br>skilled, and they're continuing to work on their creation.<br><br>Oddly enough, Storm isn't doing much, so far, except gathering strength.
<br>Aside from continuing to infect other Windows machines and attacking<br>particular sites that are attacking it, Storm has only been implicated<br>in some pump-and-dump stock scams. There are rumors that Storm is leased
<br>out to other criminal groups. Other than that, nothing.<br><br>Personally, I'm worried about what Storm's creators are planning for<br>Phase II.<br><br>This essay originally appeared on <a href="http://Wired.com">
Wired.com</a>.<br><a href="http://www.wired.com/politics/security/commentary/securitymatters/2007/10/securitymatters_1004">http://www.wired.com/politics/security/commentary/securitymatters/2007/10/securitymatters_1004</a>
<br>or <a href="http://tinyurl.com/2xevsm">http://tinyurl.com/2xevsm</a><br><br><a href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201804528">http://www.informationweek.com/news/showArticle.jhtml?articleID=201804528
</a><br>or <a href="http://tinyurl.com/3ae6gt">http://tinyurl.com/3ae6gt</a><br><a href="http://www.informationweek.com/showArticle.jhtml;jsessionid=SNSXKAZRQ04MMQSNDLRSKHSCJUNN2JVN?articleID=201803920">http://www.informationweek.com/showArticle.jhtml;jsessionid=SNSXKAZRQ04MMQSNDLRSKHSCJUNN2JVN?articleID=201803920
</a><br>or <a href="http://tinyurl.com/2lq3xt">http://tinyurl.com/2lq3xt</a><br><a href="http://www.informationweek.com/showArticle.jhtml;jsessionid=SNSXKAZRQ04MMQSNDLRSKHSCJUNN2JVN?articleID=201805274">http://www.informationweek.com/showArticle.jhtml;jsessionid=SNSXKAZRQ04MMQSNDLRSKHSCJUNN2JVN?articleID=201805274
</a><br>or <a href="http://tinyurl.com/3bb4f5">http://tinyurl.com/3bb4f5</a><br><a href="http://www.scmagazineus.com/Storm-Worm-uses-e-cards-to-push-spam-near-all-time-high/article/35321/">http://www.scmagazineus.com/Storm-Worm-uses-e-cards-to-push-spam-near-all-time-high/article/35321/
</a><br>or <a href="http://tinyurl.com/33chht">http://tinyurl.com/33chht</a><br><a href="http://www.usatoday.com/tech/news/computersecurity/wormsviruses/2007-08-02-storm-spam_N.htm">http://www.usatoday.com/tech/news/computersecurity/wormsviruses/2007-08-02-storm-spam_N.htm
</a><br>or <a href="http://tinyurl.com/2c6te7">http://tinyurl.com/2c6te7</a><br><br>Fast flux:<br><a href="http://ddanchev.blogspot.com/2007/09/storm-worms-fast-flux-networks.html">http://ddanchev.blogspot.com/2007/09/storm-worms-fast-flux-networks.html
</a><br>or <a href="http://tinyurl.com/2xwgln">http://tinyurl.com/2xwgln</a><br><br>Storm's attacks:<br><a href="http://www.spamnation.info/blog/archives/2007/09/419eater_ddosd.html">http://www.spamnation.info/blog/archives/2007/09/419eater_ddosd.html
</a><br><a href="http://ddanchev.blogspot.com/2007/09/storm-worms-ddos-attitude.html">http://ddanchev.blogspot.com/2007/09/storm-worms-ddos-attitude.html</a><br><a href="http://www.disog.org/2007/09/opps-guess-i-pissed-off-storm.html">
http://www.disog.org/2007/09/opps-guess-i-pissed-off-storm.html</a><br><br>Stewart's analysis:<br><a href="http://www.secureworks.com/research/threats/storm-worm/">http://www.secureworks.com/research/threats/storm-worm/
</a><br><br>Counterworms:<br><a href="http://www.schneier.com/crypto-gram-0309.html#8">http://www.schneier.com/crypto-gram-0309.html#8</a><br><br>--<br><br>Alessio "isazi" Sclocco - Metro Olografix member<br><br>
<a href="http://www.olografix.org/isazi">http://www.olografix.org/isazi</a><br><br><br>_______________________________________________<br>Outofthebox mailing list<br><a href="mailto:Outofthebox@olografix.org">Outofthebox@olografix.org
</a><br><a href="https://www.olografix.org/mailman/listinfo/outofthebox">https://www.olografix.org/mailman/listinfo/outofthebox</a><br><br><br></blockquote></div><br>