Re: Grisoft Predicts Linux Virus Plague

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 13 Oct 2005, Charles Curley wrote:

> On Thu, Oct 13, 2005 at 01:48:45PM -0500, P. Thompson wrote:
> > 
> > On Thu, 13 Oct 2005, taharka wrote:
> > 
> > I am as big a linux advocate as anyone on a Fedora list, but most of the
> > phish servers out there seem to be improperly maintained linux based
> > machines. If you happen to scan the phish tarball often left behind some
> > of them will detect the server side phish components and most will add
> > detection if you send the tarball to them.
> 
> How does one detech a phish tarball? chkrootkit? tripwire or analogs?
> Any other tools?

Tripwire for sure, phishers are not very high tech as far as loading
mystery modules in the kernel, etc, because of the quantity of low hanging
fruit of unpatched boxes to choose from.

What I actually meant was often you can traverse the directory structure
of the phish and see little turds that the phisher left behind. Often the
tarball or zip file of the phish directory structure.  Reasonably often
you will see webphp.php which will allow you to exectute shell commands as
the apache user on the box, etc.  If you wget the tarball off the server
and sent to a virus company you will get things back like below.

With regards to the file "index.php" submitted by you on 05 Oct
10:36:02 (Australian Eastern Standard Time), we have added detection
for HTML/Phishbank.Ppal!Trojan to the signature files for the
InoculateIT engine.

The HTML(active content) file "index.php" has been determined to be
malicious. This file appears to be a malware component. A malware
component is a file that may be used by particular malware, but cannot
behave maliciously by itself.
Please restore the file from installation media or clean backup if
possible.

Aliases reported by other AV products are listed here:
(Exploit-IEPageSpoof)

Researcher comment:
Paypal phish, server side.


With regards to the file "gencmd" submitted by you on 11 Oct 12:32:14
(Australian Eastern Standard Time), we have added detection for
ELF/IRCBot.59967!Trojan to the signature files for the InoculateIT
engine.

The Linux 32bit ELF Executable file "gencmd" has been determined to be
malicious. Our researchers have analyzed the file and confirmed the
result.

Researcher comment:
IRC bot

eTrust Antivirus 6.x/v7 (Vet Engine)
    We will inform you by email ASAP when we have a signature update
    available providing detection.

eTrust Antivirus 6.x/v7 (InoculateIT Engine)
    Engine                Update version        Last Update
    23.70.0               23.70.65              12 Oct
    Please check for the latest signature updates.

These examples apply to windoze versions of CA Antivirus. But in general
antivirus companies seem to be willing to add detections probably on the
premise that ELF binaries can be stored on Windoze but run on Linux...



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux