• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Fort Disco botnet hackers bruteforce their way onto 25,000 Windows machines

Arbor Networks unearths new detection-dodging hack campaign

Security padlock image
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 07 August 2013
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

A new bruteforce botnet campaign has infected over 25,000 Windows machines with malware using an unknown infection method, according to Arbor Networks.

Arbor Networks security researcher Matthew Bing reported detecting the password-guessing campaign, codenamed Fort Disco, confirming it has already infected several popular web tools, including Joomla and WordPress.

"We've identified six related command-and-control (C&C) sites that control a botnet of over 25,000 infected Windows machines. To date, over 6,000 Joomla, WordPress, and Datalife Engine installations have been the victims of password-guessing," he wrote.

Bing said the attack has several advanced features that make it next to impossible to fully track. "The malware alone can be picked apart by disassemblers, poked and prodded in a sandbox, but by itself offers no clues into the size, scope, motivation, and impact of the attack campaign. It's much like a historian finding a discarded weapon on an ancient battlefield. Several things can be inferred, but painting a complete picture is difficult," he wrote.

The Arbor Networks researcher said the malware used in the campaign is equally elusive.

"It's unclear exactly how the malware gets installed. We were able to find reference to the malware's original filename (maykl_lyuis_bolshaya_igra_na_ponizhenie.exe) that referred to Michael Lewis' book The Big Short: Inside The Doomsday Machine in Russian with an executable attachment," wrote Bing.

"Another filename, proxycap_crack.exe, refers to a crack for the ProxyCap program. It's unclear if victims were enticed to run these files, and if so, if that is the only means of infection. The command and control sites did not offer additional clues as to the infection mechanism."

Despite the campaign's detection-dodging powers, Bing said the company has had some luck forensically examining the damage it leaves behind once it has finished with its victims. He said the company believes the campaign is linked to six C&C sites and uses at least four malware variants. Each is designed to steal victims' passwords and post them online at a hidden location for collection and use by the criminals.

Bing said the purpose of the password collection currently remains unclear, though it is undoubtedly only the first stage of a larger campaign as the criminals commonly left one of two dormant tools on their victims' systems.

The first was a PHP-based redirector that could be used to direct browsers running Windows with either Internet Explorer, Firefox or Opera to a website linked to a Styx Exploit Kit. The second was a WordPress plugin, which could be used to import posts from a Tumblr blog.

Password theft has been a growing problem within the security community. Numerous groups have been caught targeting professional forums, hoping to steal users' login details. Most recently attacks were detected on the Apple Developer and NASDAQ Community forums.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Hacking
  • cyber-crime
  • malware

V3 Latest

First plant to grow on the Moon, err, dies
First plant to grow on the Moon, err, dies

Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night

  • Communications
  • 18 January 2019
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData

Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018

  • Software
  • 18 January 2019
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand

Meteor showers as a service will be visible for about 100 kilometres in all directions

  • Communications
  • 18 January 2019
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data

New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago

  • Communications
  • 18 January 2019
Back to Top
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017