Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

'Windigo' Linux bot hijacks servers to feast on PCs behind sysadmins' backs

John E Dunn | March 20, 2014
The curious ‘Cdorked' Apache web server backdoor that alarmed admins a year ago was only one part of a larger 'Windigo' Linux-Unix botnet that has managed to hijack 26,000 Linux servers since 2011, security firm ESET has discovered.

The curious 'Cdorked' Apache web server backdoor that alarmed admins a year ago was only one part of a larger 'Windigo' Linux-Unix botnet that has managed to hijack 26,000 Linux servers since 2011, security firm ESET has discovered.

The campaign analysed in some detail by ESET in conjunction with Sweden's CERT-Bund and physics lab CERN is that of a compact but potentially very powerful botnet whose purposes include sending tens of millions of spam messages per day, stealing SSH credentials, serving drive-by malware and web redirection.

The number compromised Linux servers since it was discovered stood at 26,024, rising at a rate of 38 per day, with prominent victims including the Linux Foundation's kernel.org site and a sizable number of hosting firms including cPanel. Although this sounds modest, because these are servers, every PC visiting them could be at risk, ESET said.

The biggest danger was the bot's penchant for SSH logins, with ESET recording 5,362 being sent through the malware's exfiltration servers, ranging in length from a ridiculous 3-character length to an apparently secure 50 characters. Many other passwords seemed to be re-used over and over, suggesting admins were accessing several servers using the same key.

What the discovery confirms is the tangled thread of connections between a number of pieces of malware discovered in the last three years, including not just Cdorked (the drive-by module) but with 'Ebury' (used for credential theft). More recently, researchers discovered another component, Calfbot, a spam-sending bot written in Perl.

"Windigo has been gathering strength, largely unnoticed by the security community, for over two and a half years, and currently has 10,000 servers under its control," said ESET security researcher Marc-tienne Lveill.

"Over 35 million spam messages are being sent every day to innocent users' accounts, clogging up inboxes and putting computer systems at risk. Worse still, each day over half a million computers are put at risk of infection, as they visit websites that have been poisoned by web server malware planted by Operation Windigo redirecting to malicious exploit kits and advertisements."

Evidence that researchers might be dealing with one larger system rather than a series if similar but unrelated pieces of malware came when they noticed that they seemed to be present on the same hosts, while two components embedded identical URLs in spam messages. Cdorked and Ebury also shared a suspiciously similar encryption routine.

It almost comes as a relief that Windigo appears to be a criminal enterprise and not another example of state-backed malware but that won't come as much consolation for the owners of the Linux servers who have had their systems hijacked to infect Windows users.

 

1  2  Next Page 

Sign up for CIO Asia eNewsletters.