Apache web servers targeted by stealthy 'Cdorked' malware

Apache web servers targeted by stealthy 'Cdorked' malware

تاریخ ایجاد

ID: IRCNE2013051833
Date: 2013-05-05

According to "techworld", security researchers have discovered a new Apache web server backdoor that is so stealthy it leaves almost no trace of its redirection behaviour on the hard drive or in server log files.
According to an analysis by security firms ESET and Sucuri, spotting the Linux/Cdorked.A module will prove a challenge to even the most diligent web admin.
Unlike the majority of such malware, Cdorked writes no files to the server’s hard drive, storing its configuration in a few megabytes of main memory that it happily shares with other processes.
“There are two ways the attacker can control the behaviour of the backdoored server: through a reverse connect shell or through special commands, all of them are triggered via HTTP requests,” said ESET’s Pierre-Marc Bureau.
Although small by Internet standards, ESET’s engineers still estimate that hundreds of servers are affected which probably equates to thousands of websites co-opted to serve redirects.
Detecting and getting rid of it means either checking the integrity of the Apache package or, better still, looking at a memory dump to spot the malware’s binary.
"We urge system administrators to check their servers and verify that they are not affected by this threat," said ESET.
ESET previously reported on Linux/Chapro.A, an attack aimed at Internet bank users, and the Snasko server rootkit.
As with these attacks, Cdorked is a reminder to apply all patches and that attackers are now aiming at vulnerable servers as a weakness.

برچسب‌ها