From the article:

   The twist here is that the botmasters have customized the malware so
   that it simultaneously delivers HTTP requests to some 300 lesser
   known, but legitimate, websites, which mixes in with traffic meant
   for the command-and-control hub

It sounds like your website is one of the unfortunate 300 websites included to obscure the real command & control network. What's the size of your normal index page? If it's 13490, then you're fine, just ride out the extra traffic.

    Rene

On 4/29/2014 9:46 AM, Joe Golden wrote:
Hi Vagrants.

Anyone come across the Pushdo virus? See http://www.scmagazine.com/new-pushdo-variant-infects-more-than-100k-computers/article/257666/

I think one of my clients got bit. Thousands of different IPs hitting the site with apache records like the following, with multiple hits per second.:

186.120.72.90 - - [29/Apr/2014:08:10:26 -0400] "POST / HTTP/1.1" 200 13490 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)"

Only thing that changes is the IP and the timestamp. Always a 200 code and 13490 size.

My question is should the 200 code concern me? This means apache was happy and accepted the POST right? I've captured the bodies of some of these posts and they look like garbage. Is there a tool to look at these, or are they just supposed to be garbage packets that Pushdo is using to cover it's real communications?

This is a Drupal site and Drupal shows no record of activity in the logs or on the back end. How is someone posting to the base URL and getting away with it??

I dropped in some Rewriteconds in htaccess and it looks like I've locked them out and normal Drupal operations still run smoothly.

Cheers. Happy Spring.


--
------------------------------------------------------------------------
René Churchill
VP of Development (i.e. Geek #2)
WherezIt.com - Your source for Local information
        
[email protected] <mailto:[email protected]>
802-244-7880 x527
http://www.wherezit.com/

Reply via email to