Guest views are now limited to 12 pages. If you get an "Error" message, just sign in! If you need to create an account, click here.

Jump to content
  • CRYPTO REWARDS!

    Full endorsement on this opportunity - but it's limited, so get in while you can!

Putin says Russia will not expel US diplomats in ***-for-tat measure


Recommended Posts

President rejects dropping to ‘this level of irresponsible diplomacy’ in response to US move to kick out 35 Russian officials

Shaun Walker in Moscow, Lauren Gambino and Sabrina Siddiqui in Washington, and Esther Addley

Friday 30 December 2016 15.50 GMT

2055.jpg?w=700&q=55&auto=format&usm=12&fit=max&s=3638a1201184b8bacd2e57495b352093
Vladimir Putin said Russia’s ultimate response would depend on US attitudes to Russia under Trump.
Photograph: Planet Pi/Rex/Shutterstock
 
 
  • Upvote 1
Link to comment
Share on other sites

Obama expels 35 Russian diplomats in retaliation for US election hacking

Trump wants to ‘move on’ but says he will meet intelligence officials

FBI and Homeland Security detail Russian hacking in new report

Lauren Gambino and Sabrina Siddiqui in Washington and Shaun Walker in Moscow

Friday 30 December 2016 07.47 GMT

3179.jpg?w=700&q=55&auto=format&usm=12&fit=max&s=499e59c6a16cc8d12c637ab298bae66e
Vladimir Putin talks to Barack Obama during a meeting at the sidelines of the G20 Summit in Hangzhou, China, on 5 September 2016.
Photograph: Alexei Druzhinin/Sputnik/Kremlin/EPA

 

https://www.theguardian.com/us-news/2016/dec/29/barack-obama-sanctions-russia-election-hack

Link to comment
Share on other sites

28 minutes ago, okane said:

Good for Putin, a sign of a real leader.  

My God I can't believe that I'm in agreement with the President of Russia, :huh:But that is the difference between a child and a Statesmen. Putin knows that Trump isn't going to let this action stand and thus with one statement he B I T C H E D slapped Obama. The sad thing is that Obama is too narcissistic to even realize what just happened.  

  • Upvote 1
Link to comment
Share on other sites

This article is from a security firm I use on my websites to prevent hacking. Thought some of you might find it interesting.

https://www.wordfence.com/blog/2016/12/russia-malware-ip-hack/?utm_source=list&utm_campaign=123016&utm_medium=email

US Govt Data Shows Russia Used Outdated Ukrainian PHP Malware

This entry was posted in General Security, Miscellaneous, Research, WordPress Security on December 30, 2016 by mark   48 Replies

The United States government earlier this year officially accused Russia of interfering with the US elections. Earlier this year on October 7th, the Department of Homeland Security and the Office of the Director of National Intelligence released a joint statement that began:

The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts.

Yesterday the Obama administration announced that they would expel 35 Russian diplomats and close two Russian facilities in the United States, among other measures, as punishment for interfering with the US 2016 election.

In addition, yesterday the Department of Homeland Security (DHS) and the Office of the Director of National Intelligence (DNI) released a Joint Analysis Report, or JAR, compiled by the DHS and FBI, which they say attributes the election security compromises to Russian intelligence operatives that they have codenamed ‘GRIZZLY STEPPE‘.

The report that DHS and DNI released includes in it’s first paragraph: “This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The report contains specific indicators of compromise, including IP addresses and a PHP malware sample.

At Wordfence our focus is WordPress security. Our security analysts spend a lot of time analyzing PHP malware, because WordPress is powered by PHP.

As an interesting side-project, we performed analysis on the PHP malware sample and the IP addresses that the US government has provided as “…technical details regarding the tools and infrastructure used by Russian civilian and military intelligence services (RIS)”. [Source]

We used the PHP malware indicator of compromise (IOC) that DHS provided to analyze the attack data that we aggregate to try to find the full malware sample. We discovered that attackers use it to try to infect WordPress websites. We found it in the attacks that we block. Here it is.

PAS 3.1.0

The above is the header and here is the footer. The middle contains an encrypted block of text.

PAS 3.1.0 footer

This is PHP malware that is uploaded to a server. An attacker then accesses the file in a browser and enters a password. The password also acts as a decryption key and decrypts the encrypted block of text which then executes. Once an attacker enters their password, it is stored in a cookie and they don’t need to enter the password again to access the malicious application.

We managed to capture a request from an attacker that contained their password. It was ‘avto’ without quotes. We used the password to decrypt the block of encrypted text.

This is what the decrypted PHP looks like. It is a big chunk of PHP code that is a web shell.

PAS 3.1.0 decrypted

We installed the web shell on a sandboxed environment. This is what it looks like:

PAS Web Shell

This is the kind of web shell that we see all the time in our day-to-day forensic operations. It includes the following basic features:

  • File browser/explorer
  • File search function
  • A database client to download the contents of a hacked site database
  • Network tools including a port scanner and the ability to bind a service to a port
  • A tool to brute force attack passwords on FTP and POP3 services.
  • A command line client to run arbitrary operating system commands
  • A utility to view server configuration info

By viewing the source code, we could find the name of the malware and the version. It is P.A.S. 3.1.0.

We googled it and found a website that makes this malware. You can find the site at this address: http://profexer.name/pas/download.php

PAS Website

You can enter a password that you will use to access your malware once it’s installed and then hit ‘download’ and a ZIP file downloads.

The ZIP contains a text file and the malware. The text file looks like this:

PAS malware text file

The website claims the malware is made in Ukraine and the date at the bottom has the Ukraine country code UA.

This malware is version 3.1.7 which is newer than the malware that the DHS indicator of compromise identifies. It is almost identical including it’s indentation:

PAS 3.1.7 malware header

And the footer:

PAS 3.1.7 malware footer

But PAS has evolved even further since 3.1.7. It is now version 4.1.1 which you can get from the same website:

PAS 4 Download

The 4.1.1b info.txt file:

PAS 4 info.txt

And the code has changed in 4.1.1 quite substantially. This is the header:

PAS4 header

The PAS malware is user friendly. It has an About page:

PAS About malware

They also have a helpful FAQ:

PAS malware FAQ

 

How does PAS infect WordPress websites?

This is a typical infection attempt for PAS 3.1.0 which is the DHS sample:

PAS 3.1.0 malware infection attempt

The above request is an attempt to install a plugin in the WordPress CMS through the normal file upload method. What surprised us is that this request had a full set of cookies that indicates that the user or bot doing this was signed in and this probably was an actual web browser.

It also includes the WordPress nonce which is a security feature, also indicating this is a user. Only about 25% of the attacks that we see include the WordPress nonce, which suggests that many of these attempts fail.

The vast majority of attacks we see that try to infect with PAS 3.1.0 use this kind of request. Here are a few theories:

  • WordPress website owners have malware installed on their workstations and that malware attempts to install PAS 3.1.0 on their WordPress websites.
  • This is CSRF, or cross site request forgery attack, that installs the malware. This is unlikely because the nonce is present in many requests. A nonce is a security feature that prevents CSRF attacks.
  • Users are voluntarily installing this on their own websites after downloading it from a malicious website thinking it is safe. Unlikely because the file that is uploaded is plain text PHP and it is clearly suspicious if you examine the file contents.
  • Attackers are compromising websites through some other means and then using the compromised credentials to manually sign in and install PAS 3.1.0 with a standard browser. These sign-ins could be partially or fully automated.

Malware Conclusions

DHS and DNI have released a joint statement that says:

This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The report contains specific indicators of compromise, including IP addresses and a PHP malware sample.

The PHP malware sample they have provided appears to be P.A.S. version 3.1.0 which is commonly available and the website that claims to have authored it says they are Ukrainian. It is also several versions behind the most current version of P.A.S which is 4.1.1b. One might reasonably expect Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources.

Analysis of the IP addresses provided by DHS and DNI

DHS provided us with 876 IP addresses as part of the package of indicators of compromise. Lets look at where they are located. The chart below shows the distribution of IP addresses by country.

Distribution of IP addresses

As you can see they are globally distributed with most of them in the USA.

Lets look at who the top ISP’s are who own the IP addresses:

Hosting companies that own malicious IPs

There are several hosting companies in the mix including OVH SAS, Digital OceanLinode and Hetzner. These are hosting companies that provide low cost hosting to WordPress customers and customers who use other PHP applications. A common pattern that we see in the industry is that accounts at these hosts are compromised and those hacked sites are used to launch attacks around the web.

Out of the 876 IP addresses that DHS provided, 134 or about 15% are Tor exit nodes, based on a reverse DNS lookup that we did on each IP address. These are anonymous gateways that are used by anyone using the Tor anonymous browsing service.

Tor exit nodes

We examined our attack data to see which IP addresses in the DHS data are attacking our customer websites. We found a total of 385 active IP addresses during the last 60 days. These IP addresses have launched a total of 21,095,492 complex attacks during that 60 day period that were blocked by the Wordfence firewall. We consider a complex attack to be an attack that tries to exploit a vulnerability to gain access to a target.

We also logged a total of 14,463,133 brute force attacks from these IP addresses during the same period.  A brute force attack is a login guessing attack.

The chart below shows the distribution of the number of attacks per IP address. It only takes into account complex attacks. As you can see, a small number of the IP addresses that DHS provided as IOC’s are responsible for most of the attacks on WordPress websites that we monitor.

Attack distribution from IPs

The following shows the list of the top 50 IP addresses in the DHS report sorted by the number of complex attacks we saw from each IP during the past 60 days.

screen-shot-2016-12-30-at-4-35-33-am

As you can see, many of the top attacking IP addresses are Tor exit nodes. There is also a relatively small number of IP addresses launching most of the attacks on websites we monitor.

Conclusion regarding IP address data

What we’re seeing in this IP data is a wide range of countries and hosting providers. 15% of the IP addresses are Tor exit nodes. These exit nodes are used by anyone who wants to be anonymous online, including malicious actors.

Overall Conclusion

The IP addresses that DHS provided may have been used for an attack by a state actor like Russia. But they don’t appear to provide any association with Russia. They are probably used by a wide range of other malicious actors, especially the 15% of IP addresses that are Tor exit nodes.

The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website.

You can find a public repository containing the data used in this report on github.

As always I welcome your comments. Please note that I will delete any political comments. Our goal in this report is to merely analyze the data DHS provided and share our findings.

Mark Maunder – Wordfence Founder/CEO

Special thanks to Rob McMahon and Dan Moen who provided valuable assistance with this research.

 

:cowboy2:

Link to comment
Share on other sites

1 hour ago, TexasGranny said:

Overall Conclusion

The IP addresses that DHS provided may have been used for an attack by a state actor like Russia. But they don’t appear to provide any association with Russia. They are probably used by a wide range of other malicious actors, especially the 15% of IP addresses that are Tor exit nodes.

The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website.

You can find a public repository containing the data used in this report on github.

As always I welcome your comments. Please note that I will delete any political comments. Our goal in this report is to merely analyze the data DHS provided and share our findings.

Mark Maunder – Wordfence Founder/CEO

Thank you so much Texas Granny, though most (well all) of it seems to be way above my pay grade. :lol: It does, however,present an opportunity to pick your mind on some technical issues that I will be needing to solve in the coming yr. If you wish you may contact me via PM or we can discuss in open forums, either way works for me. 

I have never used my laptop for much other than reading here and looking at news sites. Now I am setting up things for next yr to begin certain investments and other such business dealings. At this time I don't even use a simple virus software protection mostly because I don't download anything nor do I knowingly visit sites know to plant viruses, like porn sites. Nevertheless, I did use my laptop this Christmas season to purchase many things and that has given me pause. I know now that I need some kind of firewall or protection for my future endeavors that we will be involved in. 

So what I'm wondering from you is if you can show me the right direction for a complete novice to go into when said novice is about to get seriously involved in online investments. I know that I don't need to be the smartest man in the room to go forward as long as I'm willing to hire him. Or at least pay for the smartest persons tools. I am interested in top of the line protection but keep in mind that I am only a private investor and not some multinational corp. . 

I understand that web tech is your specialty and I would also like to discuss with you the possibility of creating a web page for another kind of investment that I'm looking to engage in. If there is any help that you can provide and, if Adam doesn't protest, I would greatly appreciate it.

Thank you and I pray that you and yours had a wonderful Thanksgiving and a Blessed Christmas. 

Scotty :tiphat:

Link to comment
Share on other sites

30 minutes ago, SnowGlobe7 said:

Putin and Trump have already spoke...they are both waiting for Obutt to leave office. Putin is not even phased by this...

Didja see the Tweet from the Russians in England... calling o'butt a lame duck...?

It was a real hoot !  They nailed him in that tweet !

Just like Trump nails him in tweets !

It's an epic global pile on ! :lmao::P

  • Upvote 2
Link to comment
Share on other sites

21 minutes ago, SgtFuryUSCZ said:

Didja see the Tweet from the Russians in England... calling o'butt a lame duck...?

It was a real hoot !  They nailed him in that tweet !

Just like Trump nails him in tweets !

It's an epic global pile on ! :lmao::P

lameduck-s.jpg

PUTIN LAUGHS OFF OBAMA,Putin Stunner: “We Will Not Expel Anyone; We Refuse To Sink To ‘Kitchen’ Diplomacy”

Although we have the right to retaliate, we will not resort to irresponsible ‘kitchen’ diplomacy but will plan our further steps to restore Russian-US relations based on the policies of the Trump Administration.

And with that one statement, Obama lost the diplomatic war with Russia.   :lol:

http://www.zerohedge.com/news/2016-12-30/putin-stunner-we-will-not-expel-anyone-we-refuse-sink-obamas-level

  • Upvote 5
Link to comment
Share on other sites

2 hours ago, SnowGlobe7 said:

yes he did.....through twitter...bwwwhahaaaaa

thanks for posting

First Trump, now the rest of the world - dissing the  evil little tool with the twitter ! :twothumbs:

How Ironic that the left has mis-used it to deceive US and LIE to US... now it's

been used to put the illegal usurper in his place and has backfired on KILLary to bring her down !

bwwwhahaaaaa is right ! :lol:

  • Upvote 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.


  • Testing the Rocker Badge!

  • Live Exchange Rate

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.