Web browser flaws are nothing new, but the professional crooks are finding new ways to combine these flaws into a system for turning a quick profit. This post describes an example of how one web site is combining system fingerprinting, browser vulnerabilities, email spam, fake web forums, and buggy PHP applications into an automated malware installation system.
If you would like to test your system to see if it is vulnerable to these attacks, please visit the Metasploit Browser Assessment web page.
Every couple of months, one of my family members asks to me to take a look at their computer. It seems like no matter what browser they use, or what security software they purchase, someone finds a way to infect their system with malware. Malware has become a fact of life for most Windows users and no amount of careful browsing or antivirus protection seems to make much difference.
Although banner ads are one of the more effective ways to attack a user, there are stealthier techniques available that an average PC user will never notice. Most web site visitor tracking programs use a script include tag to load client-side code from the tracking service provider. The browser will connect to the service provider, download the tracking code, and then execute that code in the context of the current web page. This technique is completely transparent to the user and provides an efficient method of tracking web site usage statistics. The same technique can be used by attackers to exploit browser flaws and trigger a malware installation.
- Send an email to each user with a link to a web site
- Post a link inside blog comment spam
- Post a link inside a web forum comment
- Trigger a PostBack link into a high-profile blog
- Flood popular sites with bogus referrers
For an effective campaign, the attacker must find a way to automate as many of these tasks as possible. They need a network of compromised systems that can be used to relay spam, proxy web attacks, and host the malware install scripts.
In most drive-by malware systems, there are three separate components:
- The traffic generator
- The exploit engine
- The malware payload
The traffic generator is any process that drives users to the web site containing the exploit engine. Examples include standard spam email, blog spam, or cross-site scripting attacks on high profile web sites. The exploit engine is set of tools that result in the malware payload being downloaded and installed. This usually takes the form of a browser-based exploit, but can also masquerade as some form of shareware application. The malware payload can be anything, common examples are remote control "bot" software and adware installers. The attacker has one goal in mind, to make money, and whatever the payload is doing, it directly contributes to the income of the attacker.
A couple days after we published the Malware Search Engine, an individual who goes by "Dude VanWinkle" emailed me with a link to a web site that contained a half-dozen different browser exploits. This web site (www.jag.mews.ru [offline]) was serving up an Apache directory index:
The Internet Explorer exploits immediately caught my attention -- it is always interesting to see what the professionals are doing with exploit code. A quick Google search for ie0601.cgi returns about 150 results, all of which are spam linking to this attack, forum logs of folks complaining the site, or research reports from one of the antivirus or security firms.
The "ie0601.cgi" script is just one version in a series of drive-by installers called 'Web-Attacker'. This CGI script is a combination of exploit engine and statistics tracking interface for automating malware installation through exploits. Other versions of Web-Attacker in the wild include ie0509, ie0604, and most recently, ie0606. A handful of security companies have already written descriptions of the new Web-Attacker and IDS signatures are available for Snort from the Bleeding Snort project. The source code for Web-Attacker is reportedly for sale from a Russian web site for less than $20 USD.
The unusual thing about the Web-Attacker code is the level of fingerprinting it performs prior to attempting an exploit. The script detects the operating system, service pack, Java Virtual Machine version, and the existence of two common antivirus products before selecting the exploit vector. This is different from the shotgun approach used by most malware install scripts and results in much higher hit ratio against the average PC user.
This script is capable of compromising any 32-bit version of Windows, from Windows 95 to Windows 2003 (and Vista builds, if they bothered to enable the WMF exploit for that version). Windows 98 users who scoff at the flaws discovered in Windows XP will have to change their tune if they still have the default Microsoft Java Virtual Machine installed. Mozilla users are at risk as well, but only those using fairly old versions of the browser.
This combination of automated fingerprinting followed by a targeted attack should serve as wake-up call to anyone who believes that a patched flaw is no longer a significant threat. The Java ByteVerifier bug used in this script was fixed in April of 2003, over three years ago, yet still works well enough to be a key component of this malware installer. The fact is that an advanced malware installer is capable of attacking almost any browser or operating system and still succeed against enough people to make money for the attacker.
Windows is the most common target, not only because it has the largest user base, but because the adware and profitable forms of malware have not been ported to other platforms. As the market share of non-Windows operating systems rise, we should expect to see similar attacks appear as soon as the numbers make it worthwhile to develop them.
The success of any drive-by malware campaign can be measured by the amount of traffic reaching the exploit engine and the success rate of the engine itself. If the attacker can push 30,000 users through their engine a day and obtain a 1 in 10 hit ratio (a very realistic number with recent IE vulnerabilities), that is still 3,000 installs a day, with the adware company paying the attacker for approximately 1 out of every 5 installs (based on whether the victim uninstalls the adware or complains). Average payment, per successful install, is about $0.40 USD. This works out to about $240 USD a day or a little over $7,000 USD a month.
A smart attacker can combine two or three adware affiliate programs to make double or triple this amount. Adware is only part of the equation though, with the appropriate payload, it is possible to make up to $1.00 per successful install, by abusing pay-per-search and pay-per-click business models. With any business, there are also expenses, and all of the things needed to drive traffic to the exploit engine also cost money. An anonymous source quotes a traffic cost of between $2.00 and $5.00 USD per 1,000 hits to the installer. This includes hosting costs for the installer and spam engines, as well as payments for banner ad distribution. These numbers are all estimates obtained from a few anonymous sources.
Switching back to our example, we also see a file called "shells.txt" sitting in the web directory. This files contains a list of URLs that lead to an administrative interface on 682 different systems. Every one of these systems is vulnerable to one or more PHP web application flaws that allows a remote script to be loaded and executed. The URLs cause each vulnerable system to the load the r57shell administrative interface from another attacker-controlled web site. This interface allows system commands to be executed, arbitrary files to transferred, and any local databases to be searched and modified. These 682 systems are used as drones to carry out the traffic generation phase of the campaign.
Another use for these drones becomes apparent if we look at the "ddos.php" page in the same directory. This PHP script (self-titled the "Cyber DDoS System") uses the list of URLs found in shells.txt to carry out large-scale denial of service on any target of choice.
Under the "seo" directory, we find a user interface for the "Forum Generator" web application. This tool is used to drive traffic to a web site by creating fake web site forums containing a specific keyword. This software is also available for purchase from a Russian web site.
More Web-Attacker resources: