[GRLUG] Linux Systems Compromised

rh90p at comcast.net rh90p at comcast.net
Mon Aug 18 22:13:57 EDT 2008


Thats interesting but it would be much more useful if some indication of what kernels and/or distros were compromised.  And is the attack EXT2/3 dependent?

 -------------- Original message ----------------------
From: "Casey DuBois" <casey at grlug.org>
> Hey GRLUG,
> I received the attached information and thought it may be useful to
> some on the list.
> -- 
> Casey DuBois
> 616-808-6942
> casey at grlug.org
> 
> 
> 
> 
> 
> -------- Original Message --------
> 
> linux rootkit in a wild...confirmed cases from our friends from other
> universities...
> 
> check your boxes...
> 
> -------- Original Message --------
> 
> -------------------------------------------------------------------------
> DFN-CERT is the emergency response team of the German Research network.
> We are currently handling compromises of linux based grid-clusters at
> German and international research sites. The attackers gained access
> by stolen ssh keys and used local kernel exploits to gain root access.
> Rootkits were installed and SSH keys have been systematically stolen
> and used to compromise further sites.
> A description of the rootkit we found on the compromised hosts we
> examined, is attached below.
> The attackers were stealing ssh keys to compromise more accounts and
> machines. The keys the attacker gained access by are obviously
> compromised.
> If the attacker got root all keys might be compromised if not further protected.
> Artifacts found on compromised hosts:
>    .p2rc       some sort of config file setting aliases for copying
>                stuff by ssh and with ssh-keys provided
>    .phalanx2   loader of the rootkit and probably backdoor
>    .sniff      sniffer log
>    sshgrab.py  python script for collecting ~/.ssh dirs and shell
>                histories of all users if readable There has been a
> rootkit called phalanx for some time which can be found at
> packetstorm:
> http://packetstormsecurity.nl/UNIX/penetration/rootkits/phalanx-b6.tar.bz2
> What we found seems to be a newer version of that rootkit. It also
> uses /dev/mem to manipulate the kernel and modify the hooks for some
> system calls. /dev/shm is used for staging, storing some of the file.
> The same directory is used by the python script.
> If the rootkit was used with the same configuration on your host, you will
> find:
> o The directory '/etc/khubd.p2/' is not listed by 'ls /etc' but can
>    be entered with 'cd /etc/khubd.p2/'
>    Alternatively, the directory '/etc/lolzz.p2' has been used in the
>    incident
> o In '/dev/shm/' there might be files of the attackers o If you create
> a directory named 'khubd.p2' it will also not be
>    shown by 'ls' but you can enter it
> The attackers could use a different configuration. Then the above
> tests will fail. There are some generic signs that a 'phalanx2'
> rootkit is installed on your system:
> o A process with id <PID> is hidden and will not be listed by 'ps'
>    or by 'ls /proc'. But the process will still accept signals and
>    the directory '/proc/<PID' can be entered.
>    Below you find a short script which searches for hidden processes
>    according to these assumptions. (Can I send signal & is the process
>    visible in /proc?)
>    I tested it but of course I can't give a guarantee that it does
>    not yield false positives or false negatives.
> o If there is a hidden directory in '/path' (e.g. '/path/secret')
>    then the link count in '/path' is too high - e.g.:
>      user at linux:/tmp$ ls -al | grep "^d"
>      drwxrwxrwt  7 root root 296 2008-08-01 15:05 .
>      drwxr-xr-x 32 root root 864 2007-12-23 12:58 ..
>      drwxrwxrwt  2 root root  72 2008-07-08 08:23 .font-unix
>      drwx------  2 user user  80 2008-07-25 23:16 ssh-eToaww5944
>      drwx------  2 user user  80 2008-07-08 08:24 ssh-wMQEEV1371
>      drwxrwxrwt  2 root root  72 2008-07-08 08:23 .X11-unix
>      user at linux:/tmp$
>    There are 6 directory references, so the link count should be 6
>    and not 7. If the filesystem is not ext2/3 the link count trick
>    might not work anymore.
> #!/bin/bash
> for PID in `seq 1 65535`; do
>   if kill -0 ${PID} 2>/dev/null
>   then
>     if ls /proc/*/task/*/cmdline | grep "/${PID}/cmdline" >/dev/null
>     then
>       true
>     else
>       CMD=`cat /proc/${PID}/cmdline`
>       echo "PID ${PID} versteckt?! cmdline: '${CMD}'"
>     fi
>   fi
> done
> ----------------------
> Andreas Bunten (CSIRT), +49 40 808077-555 DFN-CERT Services GmbH,
> https://www.dfn-cert.de,  Phone  +49 40 808077-555 Sitz / Register:
> Hamburg, AG Hamburg, HRB 88805,  Ust-IdNr.:  DE 232129737
> Sachsenstrasse 5, 20097 Hamburg/Germany,  CEO: Dr. Klaus-Peter
> Kossakowski
> --------------------------------------------------------------------
> Figure 1: DFN-CERT Notice
> 
> 
> References
> 
> DFN-CERT
> 
> http://www.dfn-cert.de/
> 
> University of Chicago
> 
> http://hep.uchicago.edu/admin/report_072808.html
> 
> --
> Artem Kazantsev
> Duke University
> IT Security Office
> mailto:artem.kazantsev at duke.edu
> +1(919) 668-2794 (o)
> +1(919) 668-2953 (f)
> +1(919) 624-4631 (c)
> _______________________________________________
> grlug mailing list
> grlug at grlug.org
> http://shinobu.grlug.org/cgi-bin/mailman/listinfo/grlug



More information about the grlug mailing list