Mine Host
By Kevin Whelan Posted May 31, 2019 In ITC's Threat of the Week

Mine Host

A couple of weeks ago we talked about a serious vulnerability (wormable, apparently) now called BlueKeep in the Microsoft RDP server, for which emergency patches were released.

As usual, our advice along with that of most sane security people, sysadmins and everyone in between was (and still is) to patch ASAP. It comes as no real surprise to us that this week there remains over 1 Meeelion servers facing the Internet with open arms on the standard RDP port that are still vulnerable to the bug. A meeelion is a big number, bigger in fact than the number of days since Christ was allegedly crucified. This is going to turn into a big problem for the afflicted sooner rather than later. Rising again may prove tricky.

There can only be three reasons that this is the case. Laziness, stupidity or perhaps not even knowing what you have out there.

Which brings us neatly onto this week’s SNAFU.

The wonderful boys and girls at Guardicore have published details of a ‘China based campaign which aimed to infect Windows MS-SQL and PHPMyAdmin servers worldwide’. They have named the campaign Nansh0u, probably because of the pain the infected will be feeling.

To date, Guardicore are putting the number of infected servers at nearly 50,000. Once infected, it appears that the primary payload is a cryptominer, although rootkits and other associated nasties (20 in all) have been spotted out there in the Wild West that is Internet facing servers.

There are a number of interesting things about this campaign. Firstly it doesn’t look to be Nation State activity, but does use some of the techniques seen by that Nation State in particular, in various APT offensive operations.

Secondly it uses a very simple method to access the servers, first they do a port scan to find open MS-SQL and PHPMyAdmin servers, then guess what, they look for weak passwords using a table. Once logged in, they use standard (should be patches, tsk tsk) privilege escalation techniques. They use the Windows Kernel mode exploit CVE-2014-4113. They then drop the payload, one of 20 as discussed, some of which are very sophisticated and look like the work of a much more sophisticated outfit, something Government sponsored, so it would appear that it isn’t just the NSA whose exploits are out in the wild, which is both interesting and fairly scary.

Why would you have unpatched MS-SQL or PHPMyAdmin servers directly connected to the internet with weak passwords? If we run into one of the 50,000 sysadmins who have made this happen, we will let you know, although we suspect our old friends Laziness, Stupidity or perhaps not even knowing what you have out there.

If you, or possibly a friend of yours is in this position, we would urge you/them to have a look at the Indicators of Compromise, and run this Powershell script to see if you have been infected, both provided by the wonderful people at Guardicore, absolutely free of charge.

If you are not sure if you have these naughty servers on your estate, we recommend that you scan your perimeter using one of a number of tools, NMAP, Shodan and Qualys come to mind. This is probably A Very Good Idea anyway and something you should do regularly to see if one of your horse riding, cowboy hat wearing developers had stood up a ‘test server’, unpatched, connected to the Internet which will stay there for years and may also be connected to the inside.

As it happens, ITC Secure has been scanning people’s externals, and internals for that matter for donkey’s years. If you do not have the time or inclination to do this yourselves, please contact us at: [email protected] or call 020 7517 3900. Our team of eager, highly trained and experienced consultants would be very happy to help you out.

要查看或添加评论,请登录

Tom Millar的更多文章

  • Sonic Boom

    Sonic Boom

    It has been an un-seasonably frenetic week in the Cyber Security coal mines this week, so much so that this week’s rant…

    2 条评论
  • Barr Humbug

    Barr Humbug

    Unfortunately we will not be talking about the legendary A.G.

    3 条评论
  • Mug Shot

    Mug Shot

    Unless you have been participating in one of those tiresome live ‘off the grid’ challenges, and we mean a proper one…

  • To Fine, To Serve

    To Fine, To Serve

    Unless you have been stricken with memory loss, brainwashed by positive corporate messaging, or otherwise impaired, you…

  • Silence is Golden

    Silence is Golden

    Do you remember reports about a Russian cybergang called Silence? They launched successful attacks against a number of…

  • Hip Hop

    Hip Hop

    Regular readers of these ramblings will remember that we first reported about the nefarious activities of the Chinese…

  • Delphic Oracle

    Delphic Oracle

    For some time, we have heard rumours circulating in some of the darker parts of the web about issues with Oracle’s…

  • G-Spam

    G-Spam

    This week, the brilliant/devious (delete as applicable) folks at Kaspersky called out the mighty Google for allowing…

  • HackFest

    HackFest

    This week has seen a large number of hacking announcements; it is going to be tricky to squeeze even the interesting…

  • Patient Zero

    Patient Zero

    Have you heard of the mystery hacker SandboxEscaper? To refresh your memories, SandboxEscaper is an avid Windows…

社区洞察

其他会员也浏览了