Better understanding attacks

General Discussion of atomic repo and development projects.

Ask for help here with anything else not covered by other forums.
faris
Long Time Forum Regular
Long Time Forum Regular
Posts: 2321
Joined: Thu Dec 09, 2004 11:19 am

Better understanding attacks

Unread post by faris »

I keep a very close eye on our logs.

For some time now I've noticed that sometimes attacks come in small batches, where I'll see between 4 and 8 php injection attempts on the same domain using the same attack type and trying to load the same script from the same known malware site, each spaced a few seconds or sometimes a minute or two appart.

What I find interesting is that the IPs for the attacks are different. Sometimes totally different countries.

On the assumption that the same Skiddie is actually behind all the attempts, what might they be doing? Might they be using a set of different compromised servers? Or Tor? Or something else?

Is there a tool that allows them to automate this IP skipping in some way, or are such batch attacks a sign of someone with a little more sophistication than usual?

Very occasionally I'll see different attacks being used per IP, yet still spaced very closely and using the same malware site as the source of the script they are attempting to inject.

Faris.
--------------------------------
<advert>
If you want to rent a UK-based VPS that comes with friendly advice and support from a fellow ART fan, please get in touch.
</advert>
scott
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 8355
Joined: Wed Dec 31, 1969 8:00 pm
Location: earth
Contact:

Re: Better understanding attacks

Unread post by scott »

Tor gets used a lot, or they'll cycle through lists of open proxies. It could also be an attack via a botnet.
faris
Long Time Forum Regular
Long Time Forum Regular
Posts: 2321
Joined: Thu Dec 09, 2004 11:19 am

Re: Better understanding attacks

Unread post by faris »

Interesting. OK, so we are back to needing an RBL (or IP list to add to a firewall) with TOR nodes in it.

I'll look into this a bit more.

Faris.
--------------------------------
<advert>
If you want to rent a UK-based VPS that comes with friendly advice and support from a fellow ART fan, please get in touch.
</advert>
scott
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 8355
Joined: Wed Dec 31, 1969 8:00 pm
Location: earth
Contact:

Re: Better understanding attacks

Unread post by scott »

yeah, we have one for tor, open proxies, etc that we're using internally. It will probably show up in ASL in the near future
faris
Long Time Forum Regular
Long Time Forum Regular
Posts: 2321
Joined: Thu Dec 09, 2004 11:19 am

Re: Better understanding attacks

Unread post by faris »

If it is an IP list, would you care to share before then? Obviously tor exit nodes change quite frequently, but the core ones stay the same so even an out of date list would be useful.

Faris.
--------------------------------
<advert>
If you want to rent a UK-based VPS that comes with friendly advice and support from a fellow ART fan, please get in touch.
</advert>
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4155
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Re: Better understanding attacks

Unread post by mikeshinn »

I'm working on the TOR add on now. The IP list *huge*, so I'll see what I can do about packaging it as an unsupported list, no promises though - its big. I'd prefer to get the auto-tor-rbl done sooner than later. Your box will basically generate the list in real time by asking the TOR directory nodes themselves, so there will be nothing for us to maintain or an RBL to query - you'll ask your own system.
faris
Long Time Forum Regular
Long Time Forum Regular
Posts: 2321
Joined: Thu Dec 09, 2004 11:19 am

Re: Better understanding attacks

Unread post by faris »

OK, sounds good -- I think if the list is huge we should wait until it is an integrated feature.

I'm a little alarmed by how long the firewall takes to load with the current block list (most of south america, plus some well known bad countries) that I have in place as it is. I'm really quite surprised at how slow it is, in fact.

... But that's another story :-)

Faris.
--------------------------------
<advert>
If you want to rent a UK-based VPS that comes with friendly advice and support from a fellow ART fan, please get in touch.
</advert>
scott
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 8355
Joined: Wed Dec 31, 1969 8:00 pm
Location: earth
Contact:

Re: Better understanding attacks

Unread post by scott »

There are two different ways to do it, the way its done right now is to make it easier to integrate with other firewall systems. Theres a tradeoff there, the faster method is going to completely break integration with anything other than the native redhat/centos/fedora iptables script.
faris
Long Time Forum Regular
Long Time Forum Regular
Posts: 2321
Joined: Thu Dec 09, 2004 11:19 am

Re: Better understanding attacks

Unread post by faris »

Hmmm.....

Well, I would have thought a huge percentage of people use APF or similar, me included.

Time to get ASF (Atomic Secured Firewall) off the backburner maybe? ;-)

Faris.
--------------------------------
<advert>
If you want to rent a UK-based VPS that comes with friendly advice and support from a fellow ART fan, please get in touch.
</advert>
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4155
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Re: Better understanding attacks

Unread post by mikeshinn »

Time to get ASF (Atomic Secured Firewall) off the backburner maybe? ;-)
Heh, yeah, because the iptables route is actually not the most efficient means of doing this in Linux, there is a Better Way (TM) which means we gotta roll our own.
Post Reply