Virus legt computers Saoedisch oliebedrijf plat

donderdag 16 augustus 2012, 15:17 door Redactie, 2 reacties

Een virus heeft de computers van het grootste oliebedrijf ter wereld uitgeschakeld, zo laat het Saoedische Saudi Aramco zelf weten. Naast het isoleren van alle elektronische systemen van het gehele bedrijf, werd ook de externe toegang als voorzorgsmaatregel afgesloten. Volgens het oliebedrijf zou het virus een aantal computers hebben getroffen, maar zouden belangrijke onderdelen van het netwerk niet zijn geïnfiltreerd.

Onder handelaren ging gisteren het gerucht dat het bedrijf door een hackingaanval was getroffen, zo meldt Reuters. De olieproductie zelf zou niet in gevaar zijn geweest.

Reacties (2)
17-08-2012, 08:11 door grrr
Meer info:

Sourcefire is aware of at least one ongoing incident in the energy vertical involving a threat named "DistTrack". This is a new, destructive threat that has not perviously been seen in the wild. At this time, the earliest known sightings were on 8/14. Preliminary indications are that this malware is currently targetted in nature as no wide-spread activity has been detected.

This threat involves several files that perform different functions. The core of the malware set is a 32-bit executable named trksvr.exe and is internally identified as "Distributed Link Tracking Server". This file purports to be from Microsoft Corporation with a version number of 5.2.3790.0. This file is responsible for dropping additional files involved in the malware set. In some cases this file has been reported as str.exe.

The trkssvr.exe file drops three files: a reporter executable, a data destruction executable and 64-bit executable, also named tsksvr.exe that runs as a service. The reporter executable is responsible for communicating with a C&C server. An interesting part of this executable is that its hard-coded with the C&C address in the .rdata block, as well as a URL for communicating. The URL in .rdata is /ajax_modal/modal/data.asp and the construct for reporting is http://%s%s?%s=%s&%s=%s&state=%d (you'll see the parameter names mydata and uid as separate unicode strings in .rdata as well). While communicating with the C&C server, it uses "you" as the user-agent string. The request appears on the wire as:

GET /ajax_modal/modal/data.asp?mydata=AA==&uid=aaa.bbb.ccc.ddd&state=3067203 HTTP/1.0
User-Agent: you

The danger from this malware comes from the data destruction component. In short, this application does not pull any punches. Four hours after infection, it overwrites data files with a portion of a jpeg file, targetting files in "Documents and Settings", "Users", "Windows\System32\Drivers and "Windows\System32\Config". Once this is done the file overwrites the MBR of the machine, rendering it unable to boot. Any analysis of this malware should occur only on virtual machines or on computers you are ready to completely rebuild.

Analysis of this threat and its behavior in the wild are ongoing. Detection for these threats is already in place for FireAMP, Snort and ClamAV. In IPS mode, Snort will prevent contact with the command and control server and identify infected hosts. Protection is provided by ClamAV and FireAMP. Additionally, FireAMP's Threat Root Cause and quarantining capability will provide additional incident response and mitigation capability. Here is a list of currently available detection:

FireAMP : W32.Distrack.AP
ClamAV : Win.Trojan.DistTrack
ClamAV : Win.Trojan.DistTrack-1
Snort: BOTNET-CNC Win.Trojan.DistTrack command and control traffic (23893)
Snort: BLACKLIST User-Agent known malicious user agent - you", (23903)

Additional detection will be released as analysis and research generate further actionable data.

You know, it isn't often that we can say something is targeted and also talk about a widely distributed, devastating payload like this one. While all the facts aren't yet available, someone somewhere made a very interesting decision.
18-08-2012, 11:49 door Anoniem
En de olie stijgt weer.... dank u wel.... :S

Deze posting is gelocked. Reageren is niet meer mogelijk.