Print 9 comment(s) - last by Ammohunt.. on Nov 8 at 10:24 PM

Nearly five months of attacks went unnoticed and successful thanks to the MIT domain's strong reputation

Most content-heavy sites on the web today are driven by a mix of PHP and SQL.  Unfortunately, exploits abound from popular PHP database manager frontends like PHPMyAdmin.  Thus, "hacking" many websites has been reduced from an art down to a "brute force" search for applicable SQL vulnerabilities [1][2][3][4] [5][6][7].  And that's just was cybercriminals want.

In this bold new world of SQL injection having a reliable host for your "brute force" attack web-crawler program is essential.  A recent incident involving an infected server at the Massachusetts Institute of Technology shows how *.edu servers may be the perfect vehicle to carry out cybercriminals' attacks.

The MIT server had the perfect profile to carry out attacks.  It had bandwidth aplenty.  And it piggybacked on its school's strong reputation, making its requests automatically appear trusted and less suspicious.

MIT view
MIT's campus [Source: Aisha]

Thus it's not surprising that once a malicious softbot was planted on the MIT server that it was able to wreak havoc on the internet for nearly six months.

The attacking server was identified by Bitdefender, the antimalware arm of Romanian-based software firm Softwin.  It is unknown how the malicious software was planted on the server.  What is clear is what the attacking software has been doing.

The attacking server (CSH-2.MIT.EDU) would locate webpages and initiate a set of SQL injection attempts using GET requests and certain characters troublesome sequences like "//".  An example is seen below in the server logs:

"GET / HTTP/1.1"
"GET /muieblackcat HTTP/1.1" 404 "GET //scripts/setup.php HTTP/1.1" 301
"GET //admin/scripts/setup.php HTTP/1.1"
"GET //admin/pma/scripts/setup.php HTTP/1.1" 404
"GET //admin/phpmyadmin/scripts/setup.php HTTP/1.1" 404
"GET //db/scripts/setup.php HTTP/1.1" 404

These attempts targeted vulnerabilities in PHPMyAdmin versions 2.5.6 to 2.8.2.  PHPMyAdmin is an open source frontend that is maintained at the popular software repository SourceForge.  It has an impressive 50k+ downloads a week.  The latest version is 3.4.7.

The attacks compromised a reported 100,000+ websites in the five months since the MIT server was compromised in June.  

The script would use injection attempts to deface pages, dumping keywords on them that would elevate their page rank.  It would also dump images from BlogSpot, DeviantART, and Tumblr, among others, on the front-page.  

MIT hacked webpage
Over 100,000 webpages were compromised by the rogue MIT server. [Source: SecurityWeek]

The telltale sign of the compromised pages was a directory  "muieblackcat", which was created on the victims' server space.

For now the attack has been silenced, but it serves as a warning of the growing dangers of SQL injection attacks and the potential of abuse of trusted *.edu servers. SecurityWeek, which wrote a piece on the attacks, suggest implementing anti-injection rewrite rules/conditionals and to rename your PHPMyAdmin script to prevent quick identification from casual attackers.

Sources: SecurityWeek, MalwareCity

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

Has Dailytech been hacked?
By bupkus on 11/7/2011 7:34:25 PM , Rating: 2
See this thread.

RE: Has Dailytech been hacked?
By bupkus on 11/7/2011 7:35:59 PM , Rating: 2
Or is above a sample of the hack?

RE: Has Dailytech been hacked?
By Spookster on 11/7/2011 9:00:14 PM , Rating: 2
Yes. And because you replied to this thread they are now hacking you.

Oh crap now they are hacking ME.

"The whole principle [of censorship] is wrong. It's like demanding that grown men live on skim milk because the baby can't have steak." -- Robert Heinlein

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki