Group:

 

You may have seen this already on BuqTraq or Security Focus, but I’m posting the main SC article here.

 

Synopsis: New DDoS attack method gearing up based on M$ SQL server mis-config (sa admin account w/no password) and port 1433. Seems to be controlled via an IRC connection.

 

Report below:

 

SecurityFocus™ Identifies New DDoS Tool

SecurityFocus has identified a new hybrid tool that combines distributed denial of service (DDoS) tools, with the automated propagation techniques previously seen only in worms.

On November 20th, at approximately
4 AM PST, SecurityFocus ARIS™ Incident Analysts identified a rapidly growing network of controlled agents or "bots", increasing 600% in the last 6 hours, which can be used to launch a DDoS attack. The tool is propagated through incorrectly configured Microsoft™ SQL server systems by scanning the System Administrator accounts that contain a password specified by the attacker.

SecurityFocus recommendations:

Verify that the System Administrator "sa" account does not have a blank password if running Microsoft SQL server

Use a firewall to block port 1433


The tool named "Voyager Alpha Force," a modified and enhanced version of the DDoS tool, Kaiten, is human controlled through Internet Relay Chat (IRC) communications by connecting to an IRC server and joining a password-protected channel. An attacker is effectively able to control a large number of agents residing on compromised hosts, by issuing commands that would initiate a DDoS attack or cause the program to continue propagating.

SecurityFocus ARIS and SIA premium customers received early warning as part of the services. Additional information about the DDOS Tool can be found at http://www.securityfocus.com/archive/75.

Elias Levy
Chief
Technical Officer - SecurityFocus

Reply via email to