Backdoor targeting Apache servers spreads to nginx, Lighttpd
Posted on 08 May 2013.
Last week's revelation of the existence of Linux/Cdorked.A, a highly advanced and stealthy Apache backdoor used to drive traffic from legitimate compromised sites to malicious websites carrying Blackhole exploit packs, was only the beginning - Eset's continuing investigation has now revealed that the backdoor also infects sites running the nginx and Lighttpd webservers.


And while Apache is definitely the most widely used of the three, nginx' has also cornered a considerable portion of the market (around 15 percent).

The AV company's researchers have, so far, detected more than 400 webservers infected with the backdoor, and 50 of them are among the world's most popular and visited websites.

They also discovered that while visitors who use Internet Explorer or Firefox on Microsoft Windows XP, Vista or 7 are the only ones who get redirected to sites hosting Blackhole, iOS users are also in danger as they get redirected to adult content sites that might be hosting malware.

"The Linux/Cdorked.A threat is even more stealthy than we first thought: By analyzing how the attackers are configuring the backdoor, we found it will not deliver malicious content if the victimís IP address is in a very long list of blacklisted IP ranges, nor if the victimís internet browserís language is set to Japanese, Finnish, Russian and Ukrainian, Kazakh or Belarusian," the researchers pointed out.

"We believe the operators behind this malware campaign are making significant efforts to keep their operation under the radar and to hinder monitoring efforts as much as possible. For them, not being detected seems to be a priority over infecting as many victims as possible."

Another way with which they are trying to keep a low profile is that the backdoor Cdorked uses compromised DNS servers to resolve the IP addresses of redirected sites.

The Blackhole exploit kit is currently delivering a variant of the Glupteba Trojan to the unsuspecting victims. The malware employs blackhat SEO methods to push clickjacking contextual advertising onto users.

"We still donít know for sure how this malicious software was deployed on the web servers," the researchers admit. "We believe the infection vector is not unique. It cannot be attributed solely to installations of cPanel because only a fraction of the infected servers are using this management software. One thing is clear, this malware does not propagate by itself and it does not exploit a vulnerability in a specific software."

To help system administrators spot the existence of the backdoor on their webservers, Eset has released a script that detects a specific modified httpd binary on the hard drive that's a definitive sign of infection.









Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //