Super thorough research Brad. While I'm not affected, I appreciate your
level of expertise. 

-----Original Message-----
From: b...@bradwood.com [mailto:b...@bradwood.com] 
Sent: Thursday, September 17, 2009 2:47 PM
To: cf-talk
Subject: RE: malware patterns


Michael, a quick nMap shows the following ports are open on the server that
houseoffusion.com resolves to (64.118.74.245).

PORT     STATE SERVICE
21/tcp   open  ftp
80/tcp   open  http
135/tcp  open  msrpc
443/tcp  open  https
445/tcp  open  microsoft-ds
1025/tcp open  NFS-or-IIS
1036/tcp open  unknown
1041/tcp open  unknown
2522/tcp open  unknown
3389/tcp open  ms-term-serv
7999/tcp open  unknown

Have you accounted for each program that is listening on these ports and can
any of them closed that aren't needed?  You've got terminal services in
there as well as Directory Services.  I would audit the passwords on all the
windows accounts since they are the only thing keeping someone from using
these ports.

Also, did you ever find anything in your Windows logs?  Security under Event
Viewer should show you all authentication that happened prior to the attack.


Also, on the complete random off-chance that your vulnerability was through
a CFML file that got uploaded, taking a peek at your class files (which
would be no small task) might reveal any compiled crumbs left behind by a
rouge .cfm file that deleted itself after execution.

If you are on SQL Server 2005, I have been able to get the SQL of
recently run queries by looking in the cached execution plans.   
SELECT  cached.*,
        sqltext.*
FROM  sys.dm_exec_cached_plans cached
CROSS APPLY  sys.dm_exec_sql_text (cached.plan_handle) AS sqltext

I know those are long shots, but the sooner you look, the more you might be
able to uncover before the tracks slowly get covered.

I do hope you are able to find the cause for the benefit of us all.

~Brad



-------- Original Message --------
 Subject: malware patterns
 From: Michael Dinowitz <mdino...@houseoffusion.com>
 Date: Thu, September 17, 2009 2:08 pm
 To: cf-talk <cf-talk@houseoffusion.com>
 
 
 The recent attack on House of Fusion resulted in some useful  information
as to what you should look for. In general, all or most of  the files with
the following extensions were affected:





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Want to reach the ColdFusion community with something they want? Let them know 
on the House of Fusion mailing lists
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:326395
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4

Reply via email to