New trojan turns home PCs into porno Web site hosts

From: Richard M. Smith (rmsat_private)
Date: Thu Jul 10 2003 - 19:49:15 PDT

  • Next message: Trustix Secure Linux Advisor: "TSLSA-2003-0025 - apache"

    Hi,
    
    Some individual appears to have hijacked more than a 1,000 home
    computers starting in late June or early July and has been installing a
    new trojan horse program on them. The trojan allows this person to run a
    number of small Web sites on the hijacked home computers.  These Web
    sites consists of only a few Web pages and apparently produce income by
    directing sign-ups to for-pay porno Web sites through affiliate
    programs.  Spam emails messages get visitors to come to the small Web
    sites.
    
    To make it more difficult for these Web sites to be shut down, a single
    home computer is used for only 10 minutes to host a site.  After 10
    minutes, the IP address of the Web site is changed to a different home
    computer.  The hacker is able to do this quick switching because he has
    installed DNS name servers for his domains on other home computers under
    his control.  The DNS name servers specify that a
    hostname-to-IP-address mapping should only live for 10 minutes.
     
    Over the long July 4th weekend, some of these same Web servers were used
    in an apparent phishing scam to collect stolen PayPal passwords and
    credit card numbers.  Silicon.com has an article about this scam:
    
       Russian hackers behind fake PayPal email scam?
       http://silicon.com/news/500013-500001/1/5061.html
    
    Joe Stewart of LURHQ has obtained a copy of the trojan which he has
    named Migmaf.  His analysis of the trojan can be found on the LURHQ Web
    site:
    
       http://www.lurhq.com/migmaf.html
    
    The initial theory was that the trojan was installing a mini-Web server
    on hacked computer to host the porno Web sites.  However, Joe's analysis
    shows that the Trojan is actually a reverse HTTP proxy that makes a
    home computer act as a front for a home base Web server.
    
    The New York Times is also running an article about the trojan in its
    July 11th edition of the paper:
    
       http://www.nytimes.com/2003/07/11/technology/11HACK.html?hp
    
    Some of the domain names used by the Web sites of the trojan are:
    
       onlycoredomains.com
       pizdatohosting.com
       bigvolumesites.com
       wolrdofpisem.com
       arizonasiteslist.com
       nomorebullshitsite.com
       linkxxxsites.com
    
    I've been monitoring these domains since July 5th and found over 2,000
    unique IP address used by hosts in these domains.  Almost all of these
    IP addresses are for commercial ISPs used by home computer users.
    AOL.COM was the most used ISP. 
    
    One interesting feature of the trojan is that it times the connection
    speed of a home computer that it is running on and reports the
    connection speed back to home base.  The home base computer seems to
    only select a computer to run a reverse proxy server or the DNS name
    server if the computer has a high-speed cable or DSL Internet
    connection.
    
    It is not known at the present time how the trojan gets installed on
    people's computers.  My theory is that the Sobig.e virus might be
    involved, but the evidence is not strong at the moment.
    
    Richard M. Smith
    http://www.ComputerBytesMan.com
    



    This archive was generated by hypermail 2b30 : Fri Jul 11 2003 - 11:25:45 PDT