MalwareMustDie is back and has published his the first post of 2017. The popular malware researcher has uncovered a cyber crime gang that is harvesting credentials and credit card numbers from major websites all around the world.
MMD has published a detailed analysis of the harvesting technique used by cyber criminals.
“A legitimate user who is having authentication privilege of an existing SSH connection can forward TCP protocol in proxy-ing mechanism. It’s an almost common practice nowadays in the nutshell, specially to the services that is meant to be view from a local networking area.” wrote MMD.
“This threat’s definition is The abuse of SSH TCP forward legitimate usage, by performing automatic or manual attack to weak SSH accounts of remote devices (either servers and IoT), with brute-forcing account’s credential or passwords, to perform malicious set of TCP attacks via TCP Direct Forward technique on SSH Forwarding functionality utilizing this “force-accessed” SSH connection to targeted remote services.”
Following the operations of the criminal organization, MalwareMustDie has identified a new model of attack that has been adopted all around the world.
But let’s give a look at the overall process and the modus operandi of the attackers.
“The attacker is grabbing credentials from the hack-able targets from their infrastructure” continues MalwareMustDie blog: “They manually perform the attack or daemonized the SSH connectivity to be TCP forwarded through some layers of hack-able SSH accounts to perform the attack. The infrastructure of compromised SSH services and IoT devices are used as front-end cushion for the attack. They aimed for credential launched through several TCP attacks (HTTP/HTTPS or SMTP).”
Attackers are able to launch various forms of attacks mostly aiming HTTP (protocol) with and without SSL.
The forms of attacks are:
The analysis published by MalwareMustDie includes several PoC codes, the researcher also shared reversed code and traffic analysis, along with mitigation measures.
MMD included screenshots of most seen abuses against major websites such as PayPal, LinkedIn, Facebook, Gmail, Royal Bank, AT&T, Playstation Store, Playstation Network, eBay, Ubisoft, Sony Entertainment Network, and many others,
According to MMD, the hackers harvested a huge quantity of email from major online email services, including Gmail, Yahoo, AOL, Microsoft (Live Mail & Hotmail), Mail.ru, Yandex, etc.
When the attackers steal the credentials from a website then they use them in brute force attacks on other services.
“we have a recycle-like process for ultimate credential harvesting directed by hackers.” reads MMD.
The hackers launched both automated and manual attacks with different characteristics in the way of making connections and performing attack sessions.
“Some typical characteristic in its logged activities have suggested a human’s direct interactive during a session of attacks, supporting facts of the establishment for connection used to conduct
TCP forwarding that was manually set.” wrote MMD.
MMD, with the support of the popular cyber security expert Odisseus allowed me to prepare and share a list of the Italian websites targeted by the criminal gang.
We publish on exclusive the list of targeted Italian websites, the overall number of targets is 140, that includes many mail servers.
The complete and detailed list will be shared with Italian authorities to allow further investigations.
Among the victims there are:
It is very important that the Italian CERTs start working together to fight against this kind of threat: there is no time to waste!
The report shared by MMD is full of interesting data, including geographical distribution of the victims (mostly in the US) and the overall list of targeted IP addresses, including the Italian ones.
Special Thanks to Odisseus who supported me in the analysis of the events.
Update March 4, 2016
Security Affairs and Odisseus alerted the “Team Digitale” of the Italian Government that confirmed it is already working on the case.
About the authors
Odisseus is an Independent Security Researcher involved in Italy and worldwide in topics related to hacking, penetration testing, and development.
(Security Affairs – SSH TCP direct forward, cybercrime)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.