Attackers Hijack MIT Server

Friday, November 4, 2011 @ 01:11 PM gHale


Hackers took over a server belonging to the Massachusetts Institute of Technology (MIT) and used it to launch attacks against other websites as part of a larger drive-by download campaign.

“One MIT server (CSH-2.MIT.EDU) hosts a malicious script actively used by cyber-crooks to scan the web for vulnerable websites,” said researchers at antivirus vendor BitDefender who spotted the attack.

RELATED STORIES
Microsoft Working on Duqu Fix
Zeus Now Using Autorun
Duqu Installer Exploits a Zero Day
Looking for Duqu’s Real Target

The rogue script hosted on the MIT server searched for vulnerable installations of phpMyAdmin, a Web-based database administration tool.

When the script finds a server with phpMyAdmin version 2.5.6 through 2.8.2, it exploits a vulnerability in the application and injects malicious code into the underlying databases.

This attack campaign started in June and resulted in over 100,000 compromised websites so far, said BitDefender spokeswoman Loredana Botezatu.

The company’s researchers believe the attacks relate to the Blackhole Exploit Pack, one of the most popular drive-by download toolkits used by cybercriminals.

Users visiting websites compromised in this campaign will redirect to exploits for vulnerabilities in Java and other browser plug-ins, which try to install malware on their computers.

BitDefender said it tried to alert MIT about the security breach on their server, but received no reply.

As far as the BitDefender researchers could tell, the server is still online, but no longer attacking websites. Hackers prefer to abuse servers from large organizations because requests sent from them are more likely to pass network filters, the researchers said.

The fact these servers have considerable resources and bandwidth at their disposal is also appealing to cybercriminals and could cause problems for less powerful systems that find themselves attacked. The smaller sites can mitigate the denial-of-service effect by filtering traffic from the offending IP addresses. However, most of the time hackers don’t care if that happens because they use a hit-and-run approach.

“Even if they are likely to be spotted and terminated, by the time the infected server is taken offline, it has yielded more victims than a regular bot-infected PC,” the BitDefender spokeswoman said.

Webmasters should remove old applications from their servers or keep them updated even if they rarely use them. They should also review the server logs regularly for unusual requests that could be an indication of an attack in progress.



Leave a Reply

You must be logged in to post a comment.