[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: Found, a new rootkit

Gene Heskett wrote:
Greetings folks;

In doing some checking of a web server, we found an irc port open on 31377, one of the black hatters favorites. A port that portsentry was supposed to be rejecting but wasn't.

We stumbled over several items over the last few days, but the most obvious one was a directory called .sk, located in /usr/share/misc.

Its payload seemed fairly simple, to make an underground irc chat server out of the box.

It does this with a shell script that echos several kilobytes of octal strings to gzip in the unpack mode > to a file in the local directory called .sk, and it contains a login replacement also. We did not find that login was the one installed however. Which may be a clue that theres even more smoke in this camp than what we've found yet.

The execution installs it by cp .sk /usr/bin/apmd, but puts it in /usr/bin as opposed to the real apmd's location of /usr/sbin, and adds a starter line so its enabled on boot to something we haven't found yet. It also appears to start a third instance of portsentry somehow.

We've cut our bandwidth use in half by getting rid of that. We also checked the logs and added several dozen more addresses to /etc/hosts.deny, including many script based password guess attempts that didn't get in. And put portsentry in its most paranoid anal mode with a few additions yet.

Just thought everybody would like to know about this bit of black hat tomfoolery.

Thanks for the heads-up!  Does rkhunter find this crap ?



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]