Exclusive: MalwareMustDie for Security Affairs released the list of the sites under attack. A criminal gang is using SSH TCP direct forward attack technique.
MalwareMustDie is back and has published his the first post of 2017. The popular malware researcher has uncovered a cyber crime gang that is harvesting credentials and credit card numbers from major websites all around the world.
MMD has published a detailed analysis of the harvesting technique used by cyber criminals.
“A legitimate user who is having authentication privilege of an existing SSH connection can forward TCP protocol in proxy-ing mechanism. It’s an almost common practice nowadays in the nutshell, specially to the services that is meant to be view from a local networking area.” wrote MMD.
“This threat’s definition is The abuse of SSH TCP forward legitimate usage, by performing automatic or manual attack to weak SSH accounts of remote devices (either servers and IoT), with brute-forcing account’s credential or passwords, to perform malicious set of TCP attacks via TCP Direct Forward technique on SSH Forwarding functionality utilizing this “force-accessed” SSH connection to targeted remote services.”
Following the operations of the criminal organization, MalwareMustDie has identified a new model of attack that has been adopted all around the world.
Figure 1: The scheme adopted by a new threat
But let’s give a look at the overall process and the modus operandi of the attackers.
“The attacker is grabbing credentials from the hack-able targets from their infrastructure” continues MalwareMustDie blog: “They manually perform the attack or daemonized the SSH connectivity to be TCP forwarded through some layers of hack-able SSH accounts to perform the attack. The infrastructure of compromised SSH services and IoT devices are used as front-end cushion for the attack. They aimed for credential launched through several TCP attacks (HTTP/HTTPS or SMTP).”
Attackers are able to launch various forms of attacks mostly aiming HTTP (protocol) with and without SSL.
The forms of attacks are:
- Sending malformed HTTP requests to a targeted web server to exploit the service.
- Sending invalid HTTP method requests for mod-ssl vulnerabilities with the same purpose as above.
- Sending HTTP requests to force (brute)authentication in a legitimate sites for user(s) and password(s).
- Sending HTTP requests to compromised sites to allegedly confirm suspicious activities.sites to allegedly confirm suspicious activities.
- Sending SMTP requests to several email servers (Hereforth is called as “MTA”).
The analysis published by MalwareMustDie includes several PoC codes, the researcher also shared reversed code and traffic analysis, along with mitigation measures.
MMD included screenshots of most seen abuses against major websites such as PayPal, LinkedIn, Facebook, Gmail, Royal Bank, AT&T, Playstation Store, Playstation Network, eBay, Ubisoft, Sony Entertainment Network, and many others,
According to MMD, the hackers harvested a huge quantity of email from major online email services, including Gmail, Yahoo, AOL, Microsoft (Live Mail & Hotmail), Mail.ru, Yandex, etc.
When the attackers steal the credentials from a website then they use them in brute force attacks on other services.
“we have a recycle-like process for ultimate credential harvesting directed by hackers.” reads MMD.
The hackers launched both automated and manual attacks with different characteristics in the way of making connections and performing attack sessions.
“Some typical characteristic in its logged activities have suggested a human’s direct interactive during a session of attacks, supporting facts of the establishment for connection used to conduct
TCP forwardingthat was manually set.” wrote MMD.
Exclusive – Italian websites under attack
MMD, with the support of the popular cyber security expert Odisseus allowed me to prepare and share a list of the Italian websites targeted by the criminal gang.
We publish on exclusive the list of targeted Italian websites, the overall number of targets is 140, that includes many mail servers.
The complete and detailed list will be shared with Italian authorities to allow further investigations.
Among the victims there are:
- Alma Mater Studiorum Universita di Bologna
- Ansaldo S.p.A. WAN
- Telecom Italia S.p.A.
- Universita degli Studi di Milano
- FAO Food and Agriculture Organization of the United Nations
- Bankadati Servizi Informatici Soc. Cons. p. A.
- Intesa Sanpaolo Group Services S.c.p.A.
- Cedecra Informatica Bancaria SRL
- DADAnet Italia
- BANCA CARIGE S.p.A.
- Italiaonline S.p.A.
- Tiscali SpA
- Fincantieri Cantieri Navali Italiani
- Server Plan S.r.l.
- Banca Popolare di Milano
- Telecom Italia S.p.A.
- FastWeb’s Main Location
It is very important that the Italian CERTs start working together to fight against this kind of threat: there is no time to waste!
The report shared by MMD is full of interesting data, including geographical distribution of the victims (mostly in the US) and the overall list of targeted IP addresses, including the Italian ones.