Mystery Malware uncovered

Discussion in 'ten-forward' started by Pieter_Arntz, Jun 20, 2003.

Thread Status:
Not open for further replies.
  1. Pieter_Arntz

    Pieter_Arntz Spyware Veteran

    Joined:
    Apr 27, 2002
    Posts:
    13,491
    Location:
    Netherlands
    Security Researchers Uncover Mystery Malware
    By Dennis Fisher

    Security experts finally have a handle on mystery malware that was generating loads of suspicious IP traffic over the last few weeks. Researchers at Internet Security Systems Inc. say the culprit, which was first thought to be a new breed of Trojan, is actually a distributed network mapping tool that also acts as a listening agent. Dubbed Stumbler, the agent is not considered malicious right now because it contains no payload, but it has the potential to generate enough IP traffic to hamper network performance.
    What has experts most concerned is the ease with which Stumber could be reprogrammed to make it more damaging.

    "We're really more interested in the next version because it could easily become a worm," said Dan Ingevaldson, team lead on ISS' X-Force research and development team in Atlanta, which tracked down the Stumbler agent. "You should defnitely remove it if you find it. And you should be concerned about how it got there because someone had to put it there intentionally.
    "It's not very advanced," Ingevaldson added. "The complexity and the elegance of the network is what makes it good."
    ISS officials said it's impossible to say how many machines have been infected with Stumbler, though the amount of traffic being generated by the agent, which scans random IP address and looks for other versions itself, indicates at least several hundred infections.
    The agent captured by ISS is in Linux binary, but researchers say it could easily be ported to other platforms and likely will be.
    News of the code capture comes as a relief to investigators from several agencies, including the FBI and the Department of Homeland Security, which were also tracking the rogue IP activity.
    Stumbler first appeared around May 16 and began randomly scanning Internet-connected machines. The scanning was slow at first but began to pick up speed in recent days as more machines have become infected. ISS researchers were seeing nearly 3,000 scans an hour earlier this week across the entire address space that the company monitors.
    Stumbler scans random ports on random machines, each time sending an initial SYN packet. One of the few identifiable characteristics of the program is a window size of 55808 on each of the packets it transmits. It also spoofs the originating IP address on all of the packets, making them look as if they're coming from machines in unallocated name space. The window size led some to speculate that the malware was related to the Randex IRC bot, but experts now say the TCP window size is coincidental.
    ISS said it was alerted to the existence of the mystery agent by an employee at a defense contractor and later notified both the FBI and the CERT Coordination Center.

    Found at: http://www.eweek.com/article2/0,3959,1132253,00.asp

    I copied the entire article because folowing that link, might leave some tracking cookies.
     
  2. meneer

    meneer Registered Member

    Joined:
    Nov 27, 2002
    Posts:
    1,132
    Location:
    The Netherlands
    It has taken them more than one week :eek: First eweek report was on june 13th
    (http://www.eweek.com/article2/0,3959,1126743,00.asp

     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.