Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Gathering ‘Storm’ Superworm Poses Grave Threat to PC Nets

leave a comment »

Personally, I’m worried about what Storm’s creators are planning for Phase II.
Bruce Schneier on STORM

Did someone say SKYNET without really saying SKYNET? I think they did. Storm is an interesting hybrid with a smart group of programmers at the helm. As Schneier says they seem to have taken up their copies of Tsun Tzu and re-read them before mapping out this rogue code.

I do differ in some opinions though with Schneier on the ways to fight this hybrid. Firstly, I would suggest that Microsoft actually work on some code changes that would not allow such things to be leveraged in the first place. However, asking M$ to do anything about security is like talking to a wall.

I think though, that user education should be a larger issue here than anything else. Dumb mouse clicks are infecting these machines. The more people know the better off we’d all be. BUT, you know how many people are out there getting Nigerian scammed, so shit, we are really fucked in the “smarts” department I think as a whole where it concerns the average internet user.

Now, about the Skynet jibe… Hmmm a rogue piece of software, infecting the whole of the internet that mutates and cannot be caught up on by the anti virus companies… Hmmmmm… Say, someone have a supercomputer *NSA* that they will open up to combat this threat? HAHAHA I jest…

Its an interesting notion though, imagine if you will, a “STORM” that not only can infect the “monoculture” *thanks M$* but also attack something like… ohhh.. SCADA? Yeah, that would be interesting now huh? A intelligent hybrid that seeks out certain networks and causes damage. Remember that video I posted last week? Oh yeaaahhh… Whats that? Did you hear an inscrutable Chinese snicker there?

So, as far as I can tell, STORM only goes after M$. The most simple answer is to run critical apps on *nix from now on. Of course, then perhaps you might be creating another monoculture, but I say, one that is a damn sight more secure in coding than Winblows eh?

Lastly, the notion of creating a combat neutralizer worm has been done before. I seem to rememeber someone having done that years ago to fix all the holes another worm had opened. It worked, but had some irregularities. I think what it really shows though is that nothing is really “conrtollable” when released in the wild. Storm mutates every 30 minutes. Imagine then that someone else, a third party gets hold of the code, tweaks its mutation schema and then encrypts the payload? A potentially nastier work is on the loose huh? Now that would be interesting.

My final thought here is this… Not only criminal organizations are interested in this. Ponder if you will the NSA, or perhaps the Chinese Army’s Cyber War division taking this as an object lesson. In the Terminator films SKYNET turned out to be sentient code residing on the internet. How it came to have sentience is not known.. But its MO was much the same as STORM’s is today. As coding evolves and PC power doubles and triples with attendant broad band persistent connections… How long til we have something we can’t stop?

We are our own worst enemies here…

Bruce Schneier Email 10.04.07 | 12:00 AM

The Storm worm first appeared at the beginning of the year, hiding in e-mail attachments with the subject line: “230 dead as storm batters Europe.” Those who opened the attachment became infected, their computers joining an ever-growing botnet.

Although it’s most commonly called a worm, Storm is really more: a worm, a Trojan horse and a bot all rolled into one. It’s also the most successful example we have of a new breed of worm, and I’ve seen estimates that between 1 million and 50 million computers have been infected worldwide.

Old style worms — Sasser, Slammer, Nimda — were written by hackers looking for fame. They spread as quickly as possible (Slammer infected 75,000 computers in 10 minutes) and garnered a lot of notice in the process. The onslaught made it easier for security experts to detect the attack, but required a quick response by antivirus companies, sysadmins and users hoping to contain it. Think of this type of worm as an infectious disease that shows immediate symptoms.

Worms like Storm are written by hackers looking for profit, and they’re different. These worms spread more subtly, without making noise. Symptoms don’t appear immediately, and an infected computer can sit dormant for a long time. If it were a disease, it would be more like syphilis, whose symptoms may be mild or disappear altogether, but which will eventually come back years later and eat your brain.

Storm represents the future of malware. Let’s look at its behavior:

1. Storm is patient. A worm that attacks all the time is much easier to detect; a worm that attacks and then shuts off for a while hides much more easily.

2. Storm is designed like an ant colony, with separation of duties. Only a small fraction of infected hosts spread the worm. A much smaller fraction are C2: command-and-control servers. The rest stand by to receive orders. By only allowing a small number of hosts to propagate the virus and act as command-and-control servers, Storm is resilient against attack. Even if those hosts shut down, the network remains largely intact, and other hosts can take over those duties.

3. Storm doesn’t cause any damage, or noticeable performance impact, to the hosts. Like a parasite, it needs its host to be intact and healthy for its own survival. This makes it harder to detect, because users and network administrators won’t notice any abnormal behavior most of the time.

4. Rather than having all hosts communicate to a central server or set of servers, Storm uses a peer-to-peer network for C2. This makes the Storm botnet much harder to disable. The most common way to disable a botnet is to shut down the centralized control point. Storm doesn’t have a centralized control point, and thus can’t be shut down that way.

This technique has other advantages, too. Companies that monitor net activity can detect traffic anomalies with a centralized C2 point, but distributed C2 doesn’t show up as a spike. Communications are much harder to detect.

One standard method of tracking root C2 servers is to put an infected host through a memory debugger and figure out where its orders are coming from. This won’t work with Storm: An infected host may only know about a small fraction of infected hosts — 25-30 at a time — and those hosts are an unknown number of hops away from the primary C2 servers.

And even if a C2 node is taken down, the system doesn’t suffer. Like a hydra with many heads, Storm’s C2 structure is distributed.
5. Not only are the C2 servers distributed, but they also hide behind a constantly changing DNS technique called “fast flux.” So even if a compromised host is isolated and debugged, and a C2 server identified through the cloud, by that time it may no longer be active.

6. Storm’s payload — the code it uses to spread — morphs every 30 minutes or so, making typical AV (antivirus) and IDS techniques less effective.

7. Storm’s delivery mechanism also changes regularly. Storm started out as PDF spam, then its programmers started using e-cards and YouTube invites — anything to entice users to click on a phony link. Storm also started posting blog-comment spam, again trying to trick viewers into clicking infected links. While these sorts of things are pretty standard worm tactics, it does highlight how Storm is constantly shifting at all levels.

8. The Storm e-mail also changes all the time, leveraging social engineering techniques. There are always new subject lines and new enticing text: “A killer at 11, he’s free at 21 and …,” “football tracking program” on NFL opening weekend, and major storm and hurricane warnings. Storm’s programmers are very good at preying on human nature.

9. Last month, Storm began attacking anti-spam sites focused on identifying it — spamhaus.org, 419eater and so on — and the personal website of Joe Stewart, who published an analysis of Storm. I am reminded of a basic theory of war: Take out your enemy’s reconnaissance. Or a basic theory of urban gangs and some governments: Make sure others know not to mess with you.

Not that we really have any idea how to mess with Storm. Storm has been around for almost a year, and the antivirus companies are pretty much powerless to do anything about it. Inoculating infected machines individually is simply not going to work, and I can’t imagine forcing ISPs to quarantine infected hosts. A quarantine wouldn’t work in any case: Storm’s creators could easily design another worm — and we know that users can’t keep themselves from clicking on enticing attachments and links.

Redesigning the Microsoft Windows operating system would work, but that’s ridiculous to even suggest. Creating a counterworm would make a great piece of fiction, but it’s a really bad idea in real life. We simply don’t know how to stop Storm, except to find the people controlling it and arrest them.

Unfortunately we have no idea who controls Storm, although there’s some speculation that they’re Russian. The programmers are obviously very skilled, and they’re continuing to work on their creation.

Oddly enough, Storm isn’t doing much, so far, except gathering strength. Aside from continuing to infect other Windows machines and attacking particular sites that are attacking it, Storm has only been implicated in some pump-and-dump stock scams. There are rumors that Storm is leased out to other criminal groups. Other than that, nothing.

Personally, I’m worried about what Storm’s creators are planning for Phase II.

Written by Krypt3ia

2007/10/04 at 19:15

Posted in Uncategorized

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: