top | item 8453223

Analysis of the Linux backdoor used in Freenode IRC network compromise

93 points| noinsight | 11 years ago |nccgroup.com | reply

15 comments

order
[+] kibwen|11 years ago|reply

  > Whilst the handshake and data security mechanisms are 
  > arguably well designed the persistence mechanism isn’t in 
  > any sense stealthy.  This particular rootkit would be 
  > easily detectible using tools as Tripwire and Rootkit 
  > Hunter.
Say the persistence mechanism wasn't there. How would you go about detecting this rootkit?
[+] Sanddancer|11 years ago|reply
If the persistence mechanism wasn't there, you'd be able to detect it from the added files -- /bin/dh and ipt_ip_udp.so in your modules directory. Tools like tripwire work by hashing the files on your system so you can tell at a glance when one changes.
[+] peterwwillis|11 years ago|reply
A good firewall would prevent CnC of this machine, since they replace sequence numbers and source ports. Sadly, public research into rootkits has been stale for a decade. My guess is since nobody actually implements any strong security measures in their OSS machines there's no need to advance the state of attacks.
[+] mechazawa|11 years ago|reply
Is known what distros are affected by this backdoor, who made it and who knows the magic key?
[+] privong|11 years ago|reply
> Is known what distros are affected by this backdoor

From my understanding of the article, it was a rootkit, rather than a pre-existing backdoor. So it would have been something that was installed after a system had been penetrated using other exploits.

[+] m00dy|11 years ago|reply
Magic bytes are widely used in Backdoor development.
[+] zobzu|11 years ago|reply
Interestingly they refused to provide binary checkdums under the bogus claim of protecting freenode. After releasing all the how it works. Maybe they want money from av vendors?
[+] adricnet|11 years ago|reply
The are actively responding to a possible intrusion and are therefore not motivated to give away specific details of the attacker's techniques to either the attacker or other hostile parties.

The MD5's you want are specific to the kit used to attack their client and would disclose the effectiveness of their response and investigation to an attacker,and are also not much good to anyone else. In the Disqus comments the author offers to provide them on request from legitimate researchers.

This is a standard precaution, not at all bogus, and it is great that they were able to share as much as they did for general use.

[+] nitrogen|11 years ago|reply
A better explanation is provided down-thread on the article's comments page. The author comments are overly laden with PR-ese, but there's not much you can do with MD5 hashes of files that are customized per system anyway. Since this rootkit modifies system files and doesn't alter the kernel to hide itself, standard rootkit detection tools will find it.