Drugi talas: Doomjuice

1

Drugi talas: Doomjuice

offline
  • Stane 
  • Legendarni građanin
  • Pridružio: 13 Jan 2004
  • Poruke: 3590
  • Gde živiš: Niš

Ovo je drugi talas napada na www.microsoft.com
prvi talas je poceo Mydoom.B virusom pocetkom meseca
drugi talas je poceo ovog vikenda...

http://www.wired.com/news/infostructure/0,1377,62229,00.html?tw=wn_tophead_6



Registruj se da bi učestvovao u diskusiji. Registrovanim korisnicima se NE prikazuju reklame unutar poruka.
offline
  • Đuro Glumac
  • dipl. ing. informatike
  • Pridružio: 08 Feb 2004
  • Poruke: 3640
  • Gde živiš: ApAtIn

Pa ako njima smetaju ti napadi sta onda da kazu "obicni" windows korisnici?



offline
  • Puky  Male
  • Scottish rebel
  • Pridružio: 18 Apr 2003
  • Poruke: 5815
  • Gde živiš: u Zmajevom gnjezdu

@ Stane
Ne mesaj babe i zabe.


W32.MyDoom.A je prvi zapoceo 1 februara napad na www.sco.com.
W32.MyDoom.B se dan kasnije pojavio i napada www.sco.com i www.microsoft.com.

Vreme napada oba crva je od 1 do 12 februara.

offline
  • SVITAC 
  • Legendarni građanin
  • Pridružio: 28 Apr 2003
  • Poruke: 5919
  • Gde živiš: Beograd

SCO se baš branio .. dok je M$ nekako izbegao veće probleme .. možda baš zahvaljujući blagovremenom reagovanju AV firmi ..

offline
  • Stane 
  • Legendarni građanin
  • Pridružio: 13 Jan 2004
  • Poruke: 3590
  • Gde živiš: Niš

@Puky
ne mesam babe i zabe... procitaj clanak!
MyDoom.A je napao samo www.sco.com i oborio ga ko zvecku

MyDoom.B je mutant koji je napravio neko prepravljajuci MyDoom.A da bi izvrsio isti napad na MS. MyDoom.B se sirio mnogo krace vreme pre napada na MS i samim tim zarazio mnogo manje racunara nego MyDoom.A. Uglavnom zbog toga i napad nije uspeo.

Doomjuice je nesto sasvim trece... (neki ga nazivaju i Mydoom.C)... ali je stvar malo komplikovanija... da ne prepricavam procitajte clanak uostalom

offline
  • Puky  Male
  • Scottish rebel
  • Pridružio: 18 Apr 2003
  • Poruke: 5815
  • Gde živiš: u Zmajevom gnjezdu

@ Stane
Spomenuo si da je pocelo sa napadom sa verzijom .B a u stvari je sve pocelo sa verzijom A. Samo sam na to hteo da skrenem paznju.

offline
  • Stane 
  • Legendarni građanin
  • Pridružio: 13 Jan 2004
  • Poruke: 3590
  • Gde živiš: Niš

@Puky govorio sam o napadu na MS... taj je jedini sada interesantan jer je napad na SCO uspeo : )

Mada ovaj Doomjuice me bas zainteresovao zbog ovoga sto sma procitao

"Doomjuice, which some are describing as a variant of the MyDoom worm, spreads through e-mail systems already infected with the first version, which became the fastest-spreading virus ever when it was unleashed on the Internet at the end of January."

i zatim

"Because Doomjuice spreads directly between infected computers, rather than via e-mail"

sto znaci da nije upitanju obicni mutant vec nesto inteligentnije smisljeno. Zna li neko nesto vise o ovome?

offline
  • Puky  Male
  • Scottish rebel
  • Pridružio: 18 Apr 2003
  • Poruke: 5815
  • Gde živiš: u Zmajevom gnjezdu

SCO je pao vrlo lako jer su imali samo jedan server, dok M$ ima ceo system servera pa su se lakse odbranili od napada.

Nego, more info:
Doomjuice.A

http://www.trendmicro.com/vinfo/virusencyclo/defau.....mp;VSect=T

http://www.sophos.com/virusinfo/analyses/w32doomjuicea.html


Doomjuice.B
http://www.trendmicro.com/vinfo/virusencyclo/defau.....mp;VSect=T

http://www.sophos.com/virusinfo/analyses/w32doomjuiceb.html

offline
  • SVITAC 
  • Legendarni građanin
  • Pridružio: 28 Apr 2003
  • Poruke: 5919
  • Gde živiš: Beograd

Evo par informacija o pomenutom juice'u ..

Kaspersky Labs has detected Doomjuice, a potentially dangerous new Internet worm. Doomjuice was first detected on 9th February; it has already infected more than 100,000 computers across the world and is continuing to spread rapidly. According to Kaspersky Labs analysts, Doomjuice was written by the same person as Mydoom, possibly the most destructive virus ever, to cover the virus writer's tracks. Furthermore, this new Internet worm uses computers infected by Mydoom.a to organize an DDoS attack on the Microsoft website.

The progagation method used by Doomjuice explains the rapid spread of the worm. It uses computers already infected by Mydoom.a and Mydoom.b to spread via the Internet. The worm penetrates computers via TCP port 3127, opened by the Trojan component of Mydoom in order to receive remote commands. If the infected computer answers the request sent by the worm, Doomjuice connects and sends a copy of itself to the victim machine. The Trojan installed by Mydoom then executes the file.

Once launched, the worm copies itself to the Windows system directory under the name Intrenat.exe and registers this file in the system registry auto-run key. This ensures that the malicious program is launched every time the computer is restarted. Doomjuice then executes its prime function: it extracts a file named 'sync-src-1.00.tbz' and copies this file to the root directory, the Windows directory, the Windows system directory and to user directories in Documents and Settings. This file is a TAR archive which contains the complete source code of Mydoom.a. The goal seems to be to spread Mydoom even further, thus making it increasingly difficult to identify the original author.

Doomjuice is also programmed to carry out a DoS attack on the Microsoft site. Prior to 12th February, this will be a modified attack; the worm sends a single GET request to port 80, and repeats this at random intervals. However, after 12th February, the worm will launch a full-scale attack on the site. Given the number of computers originally infected by Mydoom, if Doomjuice continues to spread successfully, it could present a potential threat to Microsoft.

"The author of Doomjuice is not only making it difficult to trace the creator of Mydoom, but also making the source code of Mydoom.a available for everyone whose machine is infected by Doomjuice. Anyone with basic programming skills can use the Mydoom.a source code to created a clone," comments Eugene Kaspersky, Kaspersky Labs' Head of Anti-virus Research, "In fact, I think that we may be seeing a large number of Mydoom clones in the wild very soon".

Evo i nastavka priče .. nekoliko dana potom ..

Kaspersky Labs, a leading information security software developer, has detected a second version of the Internet worm Doomjuice - Doomjuice.b. It propagates using the same methods as the original Doomjuice: both worms scan the Internet for computers infected either by Mydoom.a or Mydoom.b. Doomjuice uses port 3127, breached earlier by Mydoom, to install copies of itself, which the Trojan component of Mydoom then launches.

However, Doomjuice.b differs from the previous version in that Doomjuice.b has been created solely to conduct a DoS attack on the Microsoft site. The worm first copies itself into the Windows directory under the name regedit.exe and then registers this file in the system registry auto-run key. Once installation is complete Doomjuice checks the system date. The DoS attack will be launched in any month of any year except January, excluding dates between the 8th and 12th of the month. If the system date meets these requirements, Doomjuice sends multiple get requests to port 80 on www.microsoft.com.

The author of Doomjuice.b uses a server request technique previously unknown for Internet worms: the worm's request mimics the Internet Explorer request text. As a result, requests from infected computers may not be blocked, as this technique makes it more difficult to distinguish between valid requests and ones generated by Doomjuice.b. This feature potentially increases the destructive capabilities of the worm. If Doomjuice.b becomes wide-spread, Microsoft may need to implement some of the security measures intended for such eventualities.

offline
  • SINGI
  • Pridružio: 22 Avg 2003
  • Poruke: 787
  • Gde živiš: Beograd

A evo ga vec i DoomJuice.B Mad

Kaspersky Labs, a leading information security software developer, has
detected a second version of the Internet worm Doomjuice - Doomjuice.b.
It propagates using the same methods as the original Doomjuice
(http://www.viruslist.com/eng/alert.html?id=930701): both worms scan the
Internet for computers infected either by Mydoom.a
(http://www.viruslist.com/eng/viruslist.html?id=841769) or Mydoom.b
(http://www.viruslist.com/eng/viruslist.html?id=850737). Doomjuice uses
port 3127, breached earlier by Mydoom, to install copies of itself,
which the Trojan component of Mydoom then launches.

However, Doomjuice.b differs from the previous version in that
Doomjuice.b has been created solely to conduct a DoS attack on the
Microsoft site. The worm first copies itself into the Windows directory
under the name regedit.exe and then registers this file in the system
registry auto-run key. Once installation is complete Doomjuice checks
the system date. The DoS attack will be launched in any month of any
year except January, excluding dates between the 8th and 12th of the
month. If the system date meets these requirements, Doomjuice sends
multiple get requests to port 80 on www.microsoft.com.

The author of Doomjuice.b uses a server request technique previously
unknown for Internet worms: the worm's request mimics the Internet
Explorer request text. As a result, requests from infected computers may
not be blocked, as this technique makes it more difficult to distinguish
between valid requests and ones generated by Doomjuice.b. This feature
potentially increases the destructive capabilities of the worm. If
Doomjuice.b becomes wide-spread, Microsoft may need to implement some of
the security measures intended for such eventualities.

Kaspersky Labs has already updated the anti-virus database with
protection against Doomjuice.b. A detailed description of the worm is
available in the Kaspersky Virus Encyclopedia
(http://www.viruslist.com/eng/viruslist.html?id=942691).

Ko je trenutno na forumu
 

Ukupno su 814 korisnika na forumu :: 6 registrovanih, 1 sakriven i 807 gosta   ::   [ Administrator ] [ Supermoderator ] [ Moderator ] :: Detaljnije

Najviše korisnika na forumu ikad bilo je 3466 - dana 01 Jun 2021 17:07

Korisnici koji su trenutno na forumu:
Korisnici trenutno na forumu: 9k38, Dovla, Milometer, nenad81, pera12345, slonic_tonic