Exploit for Web Server Attacks

Monday, April 29, 2013 @ 04:04 PM gHale


A malicious script targeting a year-old vulnerability may tie into the DarkLeech attack campaign caught infecting websites earlier this month.

DarkLeech compromised thousands of Web servers around the globe running Apache 2.2.2 and above. The attackers infected the servers with an SSHD backdoor that enables them to upload and configure malicious Apache modules that inject malicious iFrames onto legitimate sites.

RELATED STORIES
Yet Another DDoS Attack Strikes Firm
After Israel, Now U.S. Sites Hit
Botnets Attack Israeli Websites
BackDoor Botnet Taken Over

The malicious script in question may be playing a role in the DarkLeech campaign by providing an avenue of attack, said Craig Williams, engineering technical leader at Cisco Systems. The script targeted a Horde/IMP Plesk Webmail vulnerability that exists in unpatched versions of the Parallels Plesk control panel software commonly-used by Web hosting providers. By injecting malicious PHP code in the username field, attackers can bypass authentication and upload files to the targeted server.

“In order to upload the malicious DarkLeech modules, attackers must first gain root access to the server,” he said. “We know that both cPanel and Plesk have been vectors for compromise in the DarkLeech attacks. Given that the Horde/IMP Plesk Webmail vulnerability is being actively exploited, it is a possible avenue for gaining the needed access. However, as we noted in our blog post, this particular vector is not as common as the Plesk remote access vulnerability [CVE-2012-1557] described in the MalwareMustDie report.”

In this case, the attackers were using an IRC-based botnet as a payload that included basic flooding capabilities. The Perl script used by the attackers has been around for a number of years, and PHP exploit groups openly discuss the bot, Williams said.

“Upon successful compromise, the script joins the compromised server to an IRC channel for command and control,” he says. “It then begins a series of port scans and Google searches to find other vulnerable servers. Information collected is then relayed to the aforementioned IRC channel, where it can be acted upon by the attacker(s).”

“As for the exploit itself, since this is command injection vulnerability, there are no complicating factors to limit the number of times it can be exploited on a single server,” he said. “Contrast this with a buffer overflow, for example, where the memory would likely become corrupted after repeated exploitation attempts, resulting in unpredictable behavior. That resulting instability would help inhibit future compromises – a constraint not found with the Horde/IMP Plesk Webmail vulnerability.”

A Parallels spokesperson said the exploit Williams is warning about was in the third-party Horde webmail for Plesk 9.3 and earlier, and while those Plesk versions are “end-of-lifed now” a patch for the issue released in February of 2012.

While the exact number of servers compromised by DarkLeech may not be readily knowable by researchers, Cisco TRAC analyzed several thousand compromised websites and tracked them back to their associated hosts, Williams said. Ultimately, the company identified infected hosts in more than 48 countries.

“The highest concentration of compromised Web servers were in the U.S., UK and Germany,” he said. “Given that the average Web server hosts multiple websites, it’s not at all speculative to state that tens of thousands of websites have been impacted by this.”



Leave a Reply

You must be logged in to post a comment.