Origin and the Solution
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]


[Linux RST virus detector, cleaner and immuniser.

WARNING: I haven't checked the code thoroughly enough
to positively state that it's not a trojan itself. 
Use at your own risk.

The actual binary file is put up for download at:

http://kandalaya.org/software/kill_rst.tgz

-- Raju

This is an RFC 1153 digest.
(1 message)
-------------------------------------------------------
Overview:

At the 5th of September Qualys released a Security
Warning regarding a Linux based virus. This virus was
called  the "Remote Shell Trojan" (RST) and it
attacks Linux ELF binaries. It has replicating
abilities: when run it will infect all binaries in
/bin and the current working directory. Besides that
it also spawns a process listening on UDP port 5503.
When a properly crafted packet is received by this
process it will connect back with a system shell.

Danger:

Very often viri are not seen as a real security threat
for UNIX. A virus can not infect binaries where the
userID it is running under has no write access
to. Even under this situation viri can be a threat for
UNIX based operating-systems: Everytime a infected
binary is run it will infect all binaries in the
current working directory. It is not unthinkeble that
a user with increased privileges will later run a
binary infected by the RST. In this way the virus
can transparently spread itself over the system. This
is especially the case in production environments of
in an environment where many users share files.
This process will get into a rapid once the /bin
binaries are infected. Every execution of normal
system commands like 'ls' will infect all binaries in
the current working directory. In spite of the
theoretical immunity UNIX has is the situation
described here not unlikely to happen in many human
situations.

The backdoor process can give unpriviledged people
access to your system under the UserID the backdoor
process is running. Attackers can attempt to get
higher
privileges on the system from there.

Origin:

RST was developed by us as a research project and
intended only for internal use on our systems. Our
goal was to analyse how a non-priviledged virus could
affect a system running Linux in a normal
work-environment. Things however didnt go as they were
intended to go. An infected binary accidentely leaked
out our research lab and came into the hands of so
called "scriptkiddies". They infected their own
systems and other systems where they had access to.
>From this point the virus seemed to spread in the
wild. This should never have happened and we truely
apologize that it did. 

Our main concern now is that the spread of this virus
gets stopped and that all the infected hosts get
cleaned as soon as possible. As of now the format of
the specially crafted packet send to the listening
backdoor process is unknown to the public. But this
might eventually get reverse engineered in the future
and RST can then be actively abused by other people. 

Solution:

We have created a set of utilities which can
recursively detect and remove the virus from the
system. It also has the option to make binaries IMMUNE
for future infection by the RST. We put our best
effort in making these utilities as easy to use as
possible. And we STRONGLY RECOMMEND that you run these
to see if you are infected and to remove the RST from
all the infected binaries. We especially recommend
that multiuser systems make their system immune for
the RST as the risks for these systems are much
higher. Immunisation works by increasing the size of 
the text segment by 4096 bytes so that the "hole"
between the text and data segments is gone. After this
there's no space for the RST to add it self to the
binary anymore.

The interface to these programs is simple and
self-explanating. The user can decide wether he wants
to automatically detect and remove the RST on the
system
recursively or if he wants to apply the remover on a
per binary base. In this mode he can also get a
individual status report on wheter this binary is
infected, immune or innocent. Sample usage would be:

% perl Recurse.pl remove

For more information regarding this read the included
documentation.

Conclusion:

Again we strongly recommand that anybody running Linux
runs the detector to see if their system is infected.
Even if they do not expect anything, they can always
optionally immunise their system. This is the only way
we can fight the further spread of this virus. Again
we apologise for all the inconvenience this may have
caused. But maybe we can see it as a lesson that Linux
and UNIX are not immune for viri.

Regards,
        - anonymous

------------------------------

End of this Digest
******************

-- 
Raju Mathur          [EMAIL PROTECTED]          
http://kandalaya.org/

_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

__________________________________________________
Do You Yahoo!?
Get email alerts & NEW webcam video instant messaging with Yahoo! Messenger
http://im.yahoo.com

--
To unsubscribe, send mail to [EMAIL PROTECTED] with the body
"unsubscribe ilug-cal" and an empty subject line.
FAQ: http://www.ilug-cal.org/help/faq_list.html

Reply via email to