Nirbot: targeted attacks get personal

2007-05-01

Lysa Myers

McAfee, USA
Editor: Helen Martin

Abstract

Nirbot gains its notoriety primarily from the cat fight in which its author has been engaged. Although keenly aware of the descriptions and blog entries posted about his creations, the author seems not to be so well versed on the naming conventions used within the AV industry. Lysa Myers shares the details of this technologically unremarkable, yet reasonably successful bot.


Introduction

There has been a considerable amount of discussion in the news recently about a new bot family which refers to itself as ‘IrnBot’. By all accounts, this is a relatively unremarkable bot technologically. It is less functional than your average Sdbot variant, and it utilizes fewer different exploits to get onto machines. And yet, it would appear that this tactic has been reasonably successful. New functionality has been added over time, but the bot has kept things relatively simple.

This bot gains its notoriety primarily from the cat fight in which the author has been engaged. The author seems to be keenly aware of the descriptions and blog entries posted about his creations, but not so well versed on the naming conventions used within the AV industry. The names chosen by the various AV vendors seem to have stuck in his craw, and since they have not been ‘corrected’, he has been picking fights. This has taken the form of comments within the bots, his choice of IRC server names, and his choice of vulnerabilities to exploit.

The early days

The first variants of Nirbot were backdoor trojans rather than worms, and were simplistic even by IRC backdoor standards. When executed, they copied themselves to the Windows System directory and created a registry entry in the ‘Run’ key. The trojan would then contact an IRC server to join a predefined chat room. It could then be instructed to do things such as carrying out DDoS attacks, adding and deleting files, downloading files, capturing keystrokes, and uninstalling itself. The chat room and IRC server names at this point were random, or at least nothing that would arouse much suspicion.

From there, functionality was added to disable a list of process names so that detecting the trojan’s presence would be marginally more difficult. Then, mirroring the history of Sdbot, scan commands and lists of usernames and passwords were added so that it could copy itself to open or weakly protected shares. At this point, the author seemed to turn his focus on vulnerabilities, adding the Windows SQL Weak Password vulnerability (MS00-035), Microsoft Windows Server Service Buffer Overflow (MS06-040), and the Symantec Client Security and Symantec AntiVirus Elevation of Privilege vulnerability (SYM06-010).

After increasing the bots’ spreading capabilities, functionality regained the author’s focus. The bots were made capable of sending spam, launching TFTP and HTTP servers and proxies, as well as stealing CD keys for popular programs such as Windows. He also added functionality to thwart debuggers so that getting memory dumps would be more difficult. Later variants were tied to other malware such as W32/SpotFace, which gave them the capability to spread through IM.

What's the big deal?

The choice of the Symantec AV vulnerability is what truly set this bot family apart. This gives it a potentially different set of machines to infect – people who have AV software installed, and who perhaps have a habit of patching their machines at least semi-regularly. Sdbots and their derivatives have an ever-dwindling number of infectable machines at this point, as they’ve been using much the same vulnerabilities for some months. Nirbot is not trying to encroach much on that territory. By focusing on machines with Windows Server, SQL, or Norton AV, Nirbot is going after a smaller subset of machines to begin with. Most of the machines that would be infected through these vulnerabilities will be enterprise machines which should, in theory, have better overall protection.

There is some speculation that the spike in botnets seen in March on ShadowServer’s yearly charts is due to Nirbot’s activity [1]. It has provided something of a revival in botnet activity, since the traditional bots such as Sdbot are no longer generating the flood of activity they have in the past.

That being the case, it is clear that people are not patching all their software, regardless of whether they patch Windows.

A history in comments

This is not the first time a virus author has been displeased with the AV industry’s choice of names, nor is it the first time that such a complaint gained them more media attention. In 2001, comments in later Nimda variants indicated that the author was displeased with the AV industry’s choice to ignore his choice of name – Concept [2].

From the first variants, the Nirbot author has included comments apparently intended for AV researchers. Their progression shows us that this author is one who keeps close tabs on blogs and media coverage of his creations, as well as monitoring detection by the various AV vendors. He seems to share the same misconception as the Nimda author about how viruses are named. Clearly, he either hasn’t been keeping tabs on any creations aside from his own, or else he’s new to the game.

The first comments to appear were quite friendly in tone:

Dear Antivirus Employee: I see you have found one of my creations. If you
must make a definition please call it IrnBot. Lots of Love, Author of
IrnBot

ATTN ANTIVIRUS EMPLOYEE: If you’re going to name my very nicely coded
modular bot, at least give it the proper name of “IrnBot”. Lots of love,
Author of IrnBot

Dear antivirus employee: well it’s been an
interesting week, it’s been a good battle.
P.S. The name is IrnBot, make corrections now please.

By the beginning of the third week in February it was clear that the author was keeping tabs on the detection of his creations, and that he was not happy with what he saw. He had quickly progressed from a very friendly tone, to pleading, to being downright vitriolic:

Hello antivirus employee, I must protest your virus naming system, it
isn’t very accurate.

I as a malware author believe that I deserve the right to at least have my
creations named properly; like come on, I’m the one who keeps your ass in
business. Anyways this isn’t “RinBot”, “VanBot” or “NirBot”; the correct
name is “IrnBot”. Thank you Panda Antivirus for getting this correct. For
the rest of you, I hope you read this and make the correction, or ELSE.

As people within the security industry started trying to shut down his botnets, the author started taking the attention quite personally. He threatened DDoS attacks against the SANS website and started using IRC servers named to insult both Symantec and SANS. Stephen Doherty was the author of the first Nirbot/Rinbot description for Symantec, which seems to have earned him a special place in the malware-author’s heart.

You better f*** off SANS.org especially that Johannes Ullrich
(jullrich@***, ***-***-****) and Kevin Hong (khong@***.**, +**-*-**-***).
I really don’t have anything against you, just p*** off alright?

Dear Antivirus Employee: It’s been a rough week here at base camp, but we
will prevail. Lots of love, author of IrnBot. P.S. F*** off Symantec.

Sorry about the hospital computers :(
;
Dear Symantec: For years I have longed for just one thing, to make malware
with just the right sting, you detected my creation and got my domains
killed, but I will not stop, I can rebuild. P.S. F*** you a**holes,
especially Stephen Doherty who is the biggest f***** I know of.

The comment about the hospital seems to pertain to a particularly disruptive Nirbot infection in the Quebec health care system in mid-February which effectively knocked out its network for three days. Some hospitals had switched to VoIP phones, which were also knocked offline [3].

On 1 March 2007, CNN was infected with one of the Nirbot variants [4]. Later that week, comments appeared that were a mock interview between the malware author and CNN. They make it clear that the author has a rather distorted view of what fraud entails, and the effect his creations have on computers and networks. He implies it’s only affecting old or ignored machines, and actually doing them a service by removing other malware:

Tonight on CNN: An interview with the author(s) of Rinbot. Who are you?
Hacker(s). Are you actually disgruntled? No. Then why are you actively
going after Symantec? The worm is designed for getting the highest yield
of computers infected, not to aggravate Symantec; there is no hate. So why
attack the Symantec anti-virus program? A lot of businesses and
universities run the application, making it a prime target for
exploitation. Are you aware that your worm is crippling computer networks?
Yes that can happen on slow networks or networks with many computers; the
worm also searches and removes other worms from the system, acting as a
small anti-virus program if you will. If you wish not to have those
problems keep your software updated. Why did you taunt Symantec and other
security companies? They were the first to list the worm on their site and
try and get servers shut down. What do you intent to use the infected
computers for? Nothing  very  malicious; no fraud or anything like  that.
What is the real name of the worm and how did you come up with it? The
real name is IrnBot, it is named after a popular soft drink called IrnBru.
Thank you for your time author of Rinbot. You are very welcome CNN, thank
you for the opportunity to explain.

The soft drink he mentions, Irn-Bru, is a soda that touts itself as ‘Scotland’s other national drink’ [5]. It has been around in one form or another since the early 1890s, and until recently outsold Coca-Cola in Scotland.

A few days after the CNN incident, Offensive Computing posted a neutral discussion of this variant, including the comment above. In response to this, the Nirbot author started giving ‘shout outs’ to them by referencing them in channel names [6].

In what apparently was his last comment, the Nirbot author waxes extra-bilious about a blog posted by Pedro Bueno, discussing the addition of functionality to try to thwart reverse engineering [7]. The author’s choice of IRC server names switches from insulting Symantec and SANS to insulting Bueno directly.

Looks like Pedro Bueno is getting smart at least that’s what he thinks.
Apparently he added some new entry to his super-hyper-extra-f*****y lame
blog. Which, by the way, does not prevent in ANY way the infection of your
computer. Pedro Bueno is gay, gay, gay! (For Richard Simmons, that is.

P.S. If you were actually anything other then a complete d***** bag you
would realize that it was not intended to stop antivirus researchers, just
your everyday script kiddy. Yours truely, Author of IrnBot.

At the time of writing, since the media hype and blogging on the Nirbot family has died down, the author seems to have ceased commenting his creations. Variants continue to be discovered by the handful each day, and show no signs of abating. But it appears, for now, that the cat fight has ended.

Conclusion

This virus is really nothing new in terms of general tactics, though it’s notable how successful it has become with less functionality than the usual crop of Sdbots. It would seem, in terms of both spreading and notoriety, that this virus author has done quite well in targeting AV vendors.

While a policy of not using virus writers’ intended names is laudable, it does little to curb media interest in this sort of story. It is likely that this policy does discourage some script kiddies from trying to gain notoriety, even when it occasionally backfires as in this example.

In terms of the Symantec vulnerability used by this threat, there is not much that can be done aside from continuing to use secure programming practices. It is quite clear from the proliferation of bots using years-old vulnerabilities, that some users are reluctant to apply patches even when they’re offered automatically.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.