ZDNet:  Reviews | Downloads | Tech Update | Prices
Page OneApplicationsNetworkingeBusinessHardwareCommentary



Networking


Slapper worm slows to a crawl
By Robert Lemos
Special to ZDNet News
September 20, 2002, 5:39 AM PT


TalkBack!


A Linux worm that started spreading a week ago has reached a plateau after infecting about 7,000 servers and turning the hosts into a peer-to-peer network that could be used to attack other computers.


All about the Slapper worm

Known as Linux.Slapper.Worm, Slapper and Apache/mod_ssl, the worm's spread has fallen far short of the biggest attackers in recent times. For example, Code Red infected 400,000 servers last summer. And according to the National Strategy to Secure Cyberspace, the Nimda virus compromised 86,000 systems last fall.

Perhaps most telling, security experts are already talking about Slapper in the past tense.

"I thought it was very interesting, but it didn't do terribly much," said Roger Thompson, director of malicious code research at security services company TruSecure.

The worm exploited a flaw in the open-source security component used with many Linux-based Apache Web servers. Known as the secure sockets layer (SSL), the component is commonly used by e-commerce sites to secure transactions between the customer's computer and the company's server.

Slapper attacks Apache SSL servers running on Red Hat, SuSE, Mandrake, Slackware and Debian Linux.

A big step
Still, Slapper did take a big evolutionary step by creating a peer-to-peer network.

"The difference between this and everything else in the past is that nothing else has had an internal peer-to-peer network," said Oliver Freidrichs, senior manager of security company Symantec's incident response team.

Some attack programs, frequently referred to as bots or rats (remote access Trojans), are used by hackers who frequent the Internet chat scene, and can communicate with the antagonist via IRC (Internet relay chat) channels. However, by using a peer-to-peer network instead, the Slapper program allows the attacker to hide among the other victims of the worm's infection.

Moreover, the network reports back who has been infected, which could be helpful for the attacker to keep track of the size of the network. Commands sent to the network can cause a denial-of-service (DOS) attack by sending a deluge of data at a target, can execute code or can gather information.

However, because the network created by the Slapper worm doesn't use encryption, anyone can tap into it. That's been a boon for security researchers, who have been able to use the reporting features of the program to collect data on its spread.

Have worm, will travel
The Slapper worm may be rudimentary and lacking its own internal security, but it could also be considered a hint of what future cyberweapons may look like.

If refined, the worm could be released with the code to exploit the latest vulnerability--the SSL flaw that Slapper takes advantage of is about seven weeks old--and then three days later, the aggressor would have its own attack network. The peer-to-peer network would hide the attacker's identity, since any computer on the network could issue commands to the others. And using encryption, the attacker could reduce exploitation of the resulting network by others.

"It definitely can be used as a weapon," Freidrichs said. "I would be cautious in using that term, but it definitely is reality."

The network may have already been used to send a flood of data at a victim's Internet connection, a so-called DOS attack. One Internet service provider notified customers in an e-mail that more than 20 of its customers' machines had been infected and used to attack another company. Symantec reported that at least one security company had been the victim of the attack.

While stressing worms that exploit holes in software, as Slapper has done, are the way of the future, TruSecure's Thompson doesn't think it's much of a weapon.

"This is certainly a reasonable way to do a (distributed DOS attack) and the peer-to-peering is an interesting twist, but a straight back-dooring of something important is a better (way) to attack," he said.

Yet, with the capability to level four different types of DOS attacks at other networks and the ability to command computer to run any program, Slapper could be far more versatile than evidence has shown so far.

Despite that, there has been little response to the threat of the worm.

"I don't know that our response would be any different tomorrow than it would be today," Richard Clarke, adviser on cybersecurity to President Bush, said this week when asked what could be learned from Slapper.

Some security experts have other ideas.

On security mailing lists, there have been discussions about using the worm's own network against itself by, for example, using the command network to run a program that would delete the worm's files, said Symantec's Freidrichs.

"Someone could issue a command to kill it off," he said. However, he stressed that such an action would be illegal and, if the program to be executed has a bug, could cause more damage.

"There is a number of fears in that you are definitely committing to executing code on someone else's servers," he said.


E-mail this story! Printer Friendly

Also on ZDNet
Find the tech gear you need in CNET's Back to School guide.
Get ahead of the competition with the BizTech Library.
Improve your PC's performance with the Memory Configurator.
Don't miss up-to-the-minute IT commentary on TechRepublic's blog.
Laid off? Find a new IT job today in our Career Center.


 TalkBack: Post your comment here
       Re: Slapper worm slows to a crawl  ph 3W7

       Re: Slapper worm slows to a crawl  Burrito Warrior

       Re: Slapper worm slows to a crawl  ph 3W7

       Let's not dislocate any shoulders here boys...  Robert Crocker

       Re: Let's not dislocate any shoulders here boys...  ph 3W7

       Re: Let's not dislocate any shoulders here boys...  Tim Taylor

       Re: Let's not dislocate any shoulders here boy  ph 3W7

       Re: Let's not dislocate any shoulders here boy  Tim Taylor

       Re: Let's not dislocate any shoulders here boy  ph 3W7

       ZoneAlarm is a joke...  Kevin Ray

       (NT) Prove you can do that.  Tim Taylor

       Why would he need to?  Chris Maxwell

       Because he will be considered a liar if he doesn't  Tim Taylor

       Re: Because he will be considered a liar if he doe  ph 3W7

       Re: Because he will be considered a liar if he doe  Joe Bob

       Re: Prove you can do that.  Robert Crocker

       Re: Prove you can do that.  Tim Taylor

       Re: Prove you can do that.  Joe Bob

       Re: Prove you can do that.  Tech Head

       ZoneAlarm has had it's fair share of vulns.  Sean K

       Re: ZoneAlarm has had it's fair share of vulns.  James Allen

       Re: ZoneAlarm has had it's fair share of vulns.  Dave P

       Re: ZoneAlarm has had it's fair share of vulns  jeff thomas

       ALL personal firewalls are a joke  Joe Cuervo

       Re: ALL personal firewalls are a joke  Robert Crocker

       Re: ALL personal firewalls are a joke  Joe Cuervo

       You're wrong  James Allen

       Re: You're wrong  Dave P

       216.191.65.173  James Allen

       Re: 216.191.65.173  Burrito Warrior

       Re: 216.191.65.173  James Allen

       Re: 216.191.65.173  Burrito Warrior

       Re: 216.191.65.173  James Allen

       Re: 216.191.65.173  Burrito Warrior

       Re: 216.191.65.173  James Allen

       Re: 216.191.65.173  Burrito Warrior

       Seriously  James Allen

       Re: Seriously  Burrito Warrior

       Re: Seriously  James Allen

       Re: Seriously  Burrito Warrior

       Re: Seriously  Austin Tashis

       Re: Let's not dislocate any shoulders here boys...  Burrito Warrior

       Re: Let's not dislocate any shoulders here boys...  John L

       (NT) Great idea Robert!  Tim Taylor

       OH NO!!!!!  Robert Crocker

       (NT) A great idea is a great idea.......  Tim Taylor

       Re: Slapper worm slows to a crawl  Andy Calhoun

       M$ rhetoric  Kevin Ray

       Re: M$ rhetoric  Loverock Davidson

       Re: M$ rhetoric  ph 3W7

More Replies


 Search


 
 Tech Update

Coordinating a disaster plan

WLAN with no plan spells failure

Are you ready for "active networking?"

More networking analysis...

 News in Brief

Capcom plans $200 Xbox game  03:39PM

Internet cafe fights back in piracy dispute  02:39PM

UK police arrest suspected virus writer  12:35PM

U.S. raids online date-rape drug sellers  10:50AM

Ciena to cut 450 jobs  10:11AM

More...

 Commentary

RASH RASH
Read Tech Update's expert on security and networking More...

More Commentary...


ZDNet Tech Update
Featured Resource Centers
Sybase:
Request for more info, Whitepapers and more.
Gateway:
Hardware, Products and more.

 News Tools

 News Archives

 News in Brief

 News for your PDA

 Contact Us

 Corrections
Newsletters
Tech Update Today
Security Update
OS Update




All newsletters
FAQ
Manage my newsletters


ZDNet
Services: Cybersecurity Report | Hosting Providers | IT Resources | CNET Back to School Guide | Tech Jobs

      CNET Networks: Builder | CNET | GameSpot | mySimon | TechRepublic | ZDNet
About CNET Networks 

About Us | Feedback | Your Privacy | Service Terms | Advertise | ZDNet Jobs
 
Copyright © 2002 CNET Networks, Inc. All rights reserved. ZDNet is a registered service mark of CNET Networks, Inc. ZDNet Logo is service mark of CNET Networks, Inc.