Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested
/

New denial-of-service attack tool uses relay chat

Today's breaking news
Send to a friendFeedback


Remember the distributed denial-of-service attack tools, like Tribal Flood Network and Trin00, that last February were used in mass attacks on Web sites owned by eBay, E*Trade, CNN and Yahoo? Security experts this week say an even more dangerous tool, called Trinity, has just been discovered.

Trinity is a Linux-based distributed denial-of-service attack tool that a hacker can use to launch a massive IP flood against a victim's targeted computer, much the way its predecessors TFN and Trin00 do.

The Trinity software agent must first be secretly installed on a hacked Linux server; after that, the agent can be remotely controlled to launch a network flood en masse, in tandem with other compromised machines.

Trinity is a better tool for the attack, because it can be controlled through either a standard Internet Relay Chat (IRC) channel or AOL's chat, ICQ.

"With the older distributed denial-of-service attack tools, the hacker has to keep a list of all the machines he broke into, while with Trinity, they all report to you, and all these Trinity agents appear in the same chat room," says Chris Rouland, director of the Internet Security Systems "swat" team called the X-Force. "From a hacker's perspective, that's great."

The chat feature in the new Trinity distributed denial-of-service attack tool makes it easier for the hacker to launch an attack and helps the hacker prevent his real identity from being uncovered, since hackers typically change their IP address for use in a chat channel.

Rouland says at least 400 Linux computers - with IP addresses indicating they may be located mainly in the U.S., Romania, and Australia - have already been compromised by Trinity. That means they could be used to launch a distributed denial-of-service attack on a victim's computer.

To make use of the attack tool, a hacker first has to secretly install the Trinity agent code on a Linux server. Once done, the compromised server is forced to join an IRC channel called "#b3eblebr0x" using a special password, Rouland says.

The "#b3eblebr0x" chat channel (which seems to use AT&T as its network service) is a kind of underworld IRC server - accessed through secret password only - run by hackers to use distributed denial-of-service. There appear to be other IRC channels like this as well, Rouland notes.

The Linux "zombie" machines were compromised when hackers broke into them by exploiting a default setting for the network file system through an RFC buffer overflow, Rouland explains. "If you trace it back, it will give you root shell [access]," he says.

ISS first learned of the Trinity distributed denial-of-service attack tool when it was recently brought to the attention of the Forum of Incident Response Teams - an umbrella organization for security notification groups such as CERT - by an educational institution which found some campus computers infected by it. The educational institution has not been named. After reverse engineering the Trinity code, ISS saw several references to the word "Trinity" in it and decided to call it that.

Network administrators with Linux servers can take a number of steps to prevent their servers from becoming hosts for the Trinity attack software. They can use scanning tools - such as the ISS Internet Scanner - to scan for it. And they can block IRC traffic on ports 6665, 6666 and 6667. ISS recommends blocking Internet access to chat channels. "Chat is a conduit for distribution of malicious code," Rouland says. "It's a way to distribute Trojans, and, in addition, users who don't know how to hide their IP address will reveal it during chat. On the Internet, chat is risky business."

Rouland points out that ISS Tuesday discovered a chat room called "IP Victims" on Yahoo that is being used for the exchange of IP addresses of machines compromised by the Trojan horse Back Orifice and an older distributed denial-of-service attack tool called Sub Seven.

RELATED LINKS

Apply for your free subscription to Network World. Click here. Or get Network World delivered in PDF each week.

Get Copyright Clearance
Request a reprint or permission to use this article.


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.