New DoS attack uses Web servers as zombies

Mave

TMS Founder
Administrator
Messages
236,079
Location
Belgium
a40rgy.png

This screenshot shows the simple user interface the attack uses to launch attack.
The attacker simply specifies which IP address to target, the length of time for the
attack, and the port to target. The language at the bottom says 'don't use it on
your friends' in Indonesian.



Researchers have uncovered a botnet that uses compromised Web servers instead of the usual personal computers to launch denial-of-service (DoS) attacks.

Security firm Imperva said on Wednesday it uncovered a botnet of about 300 Web servers after one of its "honeypot" servers was used in an attack and based on a search of attack code via Google. Web servers were commonly used in such attacks a decade ago but had been replaced by the more ubiquitous Windows-based PCs, said Amachai Shulman, chief technology officer at Imperva.

In the DoS attack Imperva observed, two Web servers were targeting an unnamed hosting provider based in The Netherlands, he said. The hosting provider was aware of the situation, Shulman said.

It appeared that the Web servers were being compromised with code that exploits a vulnerability in PHP, a computer language used for processing Web pages, and it can affect servers running Apache, Microsoft Internet Information Services (IIS), or other server software, he said.
The attack employs a simple user interface that allows someone to specify the victim's IP address and port as well as the how long the attack should last. The information is submitted on a form that includes a message in Indonesian that says "don't use it on your friends," according to a screenshot provided by Shulman.

The attacker, identified as "Exeman," was hiding his or her whereabouts using the anonymity-providing Tor network, he said.
Using Web servers provides much greater bandwidth for an attack and thus requires fewer zombies than when personal computers are used and lessens the chance that the compromise will be discovered because Web servers don't typically run antivirus software, Shulman said.
"Instead of using 50 personal computers you can use a single server," he said. "To some extent, it's easier to maintain this kind of attack because there are fewer computers (involved) and there's less of a chance for the (attack) code to be detected."

Many DoS attacks are used to extort money out of Web site owners, Shulman said when asked what the motive for the attacks could be.

Source : http://news.cnet.com/8301-27080_3-20004855-245.html?tag=newsEditorsPicksArea.0
 
Sounds real fancy but this is something like remote file inclusion (RFI) on webservers, which then allows the botnet master to launch a PHP script on the webserver which attacks the target with a DoS attack. For that you'll need a control site which you can rig up with a nice HTML form script like the one in the screenshot has. I don't see anything new about this unless the webserver has been deeply infected through a operating system flaw. The chance of both, Linux and Windows servers having the same vulnerability is as small as for me to become a president one day though, so this still leaves us RFI method.
 
Back
Top Bottom