Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Malware :: ciacl064.txt

CIAC L-064 - The Lion Internet Worm DDoS Risk





             __________________________________________________________

                       The U.S. Department of Energy
                     Computer Incident Advisory Center
                           ___  __ __    _     ___
                          /       |     /_\   /
                          \___  __|__  /   \  \___
             __________________________________________________________

                              INFORMATION BULLETIN

                        The Lion Internet Worm DDOS Risk

April 2, 2001 18:00 GMT                                           Number l-064
______________________________________________________________________________
PROBLEM:       Further analysis of the Lion Internet worm by the NIPC 
               indicates that it has the potential for causing much more 
               damage than originally expected. In addition to automatically 
               propagating itself, the worm installs multiple backdoors and 
               the Tribe Flood Network (tfn2k) distributed denial of service 
               (DDOS) tool. A second version of the worm simply propagates and 
               installs a single backdoor. 
PLATFORM:      Linux on x86 platforms with unpatched BIND services but could 
               be expanded to other UNIX platforms. Affected versions of BIND 
               include: 8.2, 8.2-P1, 8.2.1, 8.2.2-Px and 8.2.3-beta. 
               Unaffected versions of BIND include: 8.2.3-REL and 9. 
DAMAGE:        The original version of the worm installs a rootkit to hide 
               itself, replacing many system utilities. Infected systems need 
               to be reinstalled to assure that all affected files are 
               replaced. Should the tfn2k tool be activated, all infected 
               machines could be used to perform a large scale distributed 
               denial of service attack. 
SOLUTION:      Users with affected versions of BIND should update immediately. 
               Network operators should watch for outgoing e-mails to 
               china.com and for incoming connections to ports 1008, 60008, 
               33567, 33568 (ssh). System owners should check for infections 
               by using the SANS tool (lionfind) or by examining the contents 
               of /dev/.lib for the worm's files and they should scan for 
               tfn2k using the NIPC tool (find_ddos). Users with infected 
               systems need to reinstall those systems. 
______________________________________________________________________________
VULNERABILITY  Risk is Medium. The worm is in the wild, however the web site
ASSESSMENT:    coollion.51.net is no longer providing the worm's files. The 
               result is that currently infected systems can still attack and 
               compromise other systems, install backdoors, and send mail to 
               china.com but cannot install the rootkit, DDOS tools, or the 
               infection tools. The potential for a large scale distributed 
               denial of service attack is high from systems infected before               coollion.51.net stopped providing files (sometime before 
               3/30/01). There is also the risk that a new variant will appear 
               that uses a different website to get its tools. 
______________________________________________________________________________

The following advisory was posted on the NIPC website on March 30, 2001. See 
the NIPC website for the latest version of this advisory: 

http://www.nipc.gov/warnings/advisories/2001/01-005.htm 

-------------------Start of NIPC Advisory------------------- 

ADVISORY 01-005

"Lion Internet Worm" DDOS Targeting Unix Systems 
Issued 03/23/2001, Updated March 30, 2001

The NIPC has received reports of an Internet worm named "Lion" that is 
infecting computers and installing distributed denial of service (DDOS) tools 
on various computer systems. Illegal activity of this nature typically is 
designed to create large networks of hosts capable of launching coordinated 
packet flooding denial of service attacks. Possible motives for this malicious 
activity include exploit demonstration, exploration and reconnaissance, or 
preparation for widespread denial of service attacks.

Description:

Access to these systems has been accomplished primarily through compromises 
exploiting the bind vulnerabilities in versions 8.2, 8.2-P1, 8.2.1, 8.2.2-Px, 
as well as the 8.2.3 betas. To read more about the bind vulnerabilities, please 
refer to the CERT/CC advisory at http://www.cert.org/advisories/CA-2001-
02.html. Once infected, the Lion worm scans random class B networks on port 53 
looking for systems running the vulnerable bind versions listed above. Once 
compromised, the system will send the contents of the /etc/password and 
/etc/shadow files to a remote computer. The worm also contacts coollion.51.net 
(211.100.18.56) and downloads a copy of the worm along with several hacking 
tools, including the "t0rn" rootkit, and Tribe Flood Network client (tfn2k). 
Additionally, a compromised system will have its /etc/hosts.deny file deleted 
thereby eliminating the host-based perimeter protection afforded by tcp 
wrappers.

In addition to the above listed toolkit, the Lion worm installs several 
backdoor compromises along with what NIPC analysis confirms is a password 
sniffer, thereby giving the hacker a network of machines from which to launch 
an attack in the future. This initial activity appears to be the precursor to a 
larger DDOS attack. These backdoor compromises provide root access to the 
victim systems, thereby making security more difficult. Systems administrators 
who detect such a compromise should take all appropriate steps to reestablish 
the integrity of their computers and networks.

Recommendations:

 NIPC recommends that all computer network owners and organizations examine 
their systems for evidence of this worm and associated DDOS tools. Specific 
technical instructions for detection of the Lion worm are available from the 
SANS website http://www.sans.org/y2k/lion.htm This site also includes a tool 
called "Lionfind" which is provided to identify the files that the worm is 
using, however, this program does not remove those files.

 Users running affected versions of bind can go to 
http://www.cert.org/advisories/CA-2001-02.html and download the most recent 
patch.

 The NIPC continues to make available on its website a software application 
(find_ddos) that can be used to detect the presence of the tfn2k client 
program.

Tool Description:

The tool (find_ddos) is available for Solaris on Sparc or Intel platforms and 
Linux on Intel platforms. It has been designed to detect tfn2k client, tfn2k 
daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht 
master, stacheldraht client, stachelddraht demon and tfn-rush client.

The latest version (3.3) should solve some out-of-memory errors, prevent self-
detection, and support process scanning on Solaris 2.5.1. Consult the readme 
file for more information.
This download is for Solaris 2.5.1, 2.6, and Solaris 7 on the Sparc or Intel 
platforms, and Linux on Intel platforms.

This tool will not work on a Windows 95/98/NT-based PC.

 Readme (http://www.nipc.gov/warnings/alerts/1999/README) 

 Solaris on Sparc Executable File (tar, compressed format) version 4.2
(http://www.nipc.gov/warnings/alerts/1999/find_ddos_v42_sparc.tar.Z)

 Linux on Intel Executable File (tar, compressed format) version 4.2 
(http://www.nipc.gov/warnings/alerts/1999/find_ddos_v42_linux.tar.Z)

 Solaris on Intel Executable File (tar, compressed format) version 4.2 
(http://www.nipc.gov/warnings/alerts/1999/find_ddos_v42_intel.tar.Z)

 Checksums (The MD5 Checksums are provided to verify the integrity of the 
files.) (http://www.nipc.gov/warnings/alerts/1999/checksums)

Please report computer crime to your local FBI office 
(www.fbi.gov/contact/fo/fo.htm) or the NIPC, and to other appropriate 
authorities. Incidents may be reported online at 
www.nipc.gov/incident/cirr.htm. The NIPC Watch and Warning Unit also can be 
reached at (202) 323-3204/3205/3206, or nipc.watch@fbi.gov.

Update As of March 30, 2001

The NIPC has confirmed two versions of the Lion worm in the wild. Upon further 
analysis of the original Lion worm, the NIPC has determined that the 
daemon/zombie portion of tfn2k is installed on a victim system once 
compromised. Further, the tfn2k daemon is launched once it is installed and 
also upon reboot. This creates a widespread zombie network that is ready to 
receive commands and launch an attack.

Additionally, it appears that the Lion worm specifically targets Linux systems, 
contrary to the what the title of this advisory originally indicated. However, 
the code could be modified to target other flavors of Unix. Also, because the 
worm overwrites systems files, it is not easily removed from an infected 
computer. Therefore, the NIPC believes that reinstalling the operating system 
(or at a minimum, reinstalling specific system files) may be the only way to 
ensure the integrity of the system.

A newer version of the Lion worm does not have the t0rn rootkit or tfn2k as 
part of it's code. As a result, the new Lion worm is roughly 1/30th the size of 
the original. 

Both versions of Lion email user and password information of systems that are 
successfully compromised. In addition, both propagate by targeting systems 
running the vulnerable versions of bind.

Technical Observations:

Original Lion (1i0n) makes the following system modifications:

1) Creates directory /dev/.lib, and installs lion files into that directory

2) Deletes the following files:
*) /.bash_history
*) /etc/hosts.deny
*) /root/.bash_history
*) /var/log/messages
*) /var/log/maillog

3) Appends "/dev/.lib/lib/scan/star.sh" to /etc/rc.d/rc.sysinit to ensure that 
the worm will continue to attempt to propagate after a reboot

4) Appends the following to /etc/inetd.conf
*) 1008 stream tcp nowait root /bin/sh sh
*) 60008 stream tcp nowait root /bin/sh sh
*) 33567 stream tcp nowait root /bin/sh sh

5) Creates file /etc/ttyhash with encrypted backdoor password

6) Creates directory /usr/src/.puta, and copies root kit configuration files 
plus
*) /usr/src/.puta/t0rnp -- linsniff password extractor
*) /usr/src/.puta/t0rnsb -- system log file wiper

7) Creates directory /usr/info/.torn, and installs secure shell configuration 
files

8) Installs and runs secure shell server in /usr/sbin/nscd

9) Installs and runs tfn2k in /bin/in.telnetd

10) Installs system log wiper into /bin/mjy

11) Creates /usr/man/man1/man1/lib/.lib, and copies the following:
*) /bin/mjy (system log wiper)
*) /bin/in.telnetd (tfn2k)
*) /bin/sh, with setuid/setgid privileges added

12) Appends the following lines to /etc/rc.d/rc.sysinit:
*) # Name Server Cache Daemon..
*)
*) /usr/sbin/nscd -q
*) /bin/in.telnetd
*)
*) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #

13) Overwrites the following executables with trojans:
*) /usr/sbin/in.fingerd -- Back door
*) /bin/ps
*) /sbin/ifconfig
*) /usr/bin/du
*) /bin/netstat
*) /usr/bin/top
*) /bin/ls
*) /usr/bin/find

14) Modifies /etc/inetd.conf to run the finger service as root

New Version of Lion (1i0n) makes the following system modifications:

1) Creates directory /dev/.lib, and installs lion files into that directory

2) Deletes the following files:
*) /.bash_history
*) /var/log/messages
*) /var/log/maillog

3) Appends "/dev/.lib/lib/scan/star.sh" to /etc/rc.d/rc.sysinit (this is not 
the correct location of the "star.sh" file, so the worm will not continue to 
propagate after a reboot)

4) Appends the following to /etc/inetd.conf
*) 1008 stream tcp nowait root /bin/sh sh

-------------------End of NIPC Advisory------------------- 


_______________________________________________________________________________

CIAC wishes to acknowledge the contributions of The National Infrastructure 
Protection Center (NIPC) for the 
information contained in this bulletin.
_______________________________________________________________________________


CIAC, the Computer Incident Advisory Capability, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.

CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
    Voice:    +1 925-422-8193 (7x24)
    FAX:      +1 925-423-8002
    STU-III:  +1 925-423-2604
    E-mail:   ciac@ciac.org

Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.

   World Wide Web:      http://www.ciac.org/
                        (or http://ciac.llnl.gov -- they're the same machine)
   Anonymous FTP:       ftp.ciac.org
                        (or ciac.llnl.gov -- they're the same machine)

PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins.  If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained via WWW at http://www.first.org/.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.

LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)

L-053: Cisco IOS Software TCP Initial Sequence Number Improvements
L-054: Microsoft IIS and Exchange Malformed URL Denial of Service
L-055: pcAnywhere Denial of Service, abnormal server connection
L-056: The Naked Wife (W32.Naked@mm) Trojan
L-057: Kerberos /tmp Root Vulnerability
L-058: HPUX Sec. Vulnerability asecure
L-059: Microsoft IIS WebDAV Denial of service Vulnerability
L-061: Microsoft IE can Divulge Location of Cached Content
L-062: Erroneous Verisign-Issued Digital Certificates for Microsoft
L-063: RedHat Linux Log Code Buffer Overflow/Unguarded Browser Call




TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH