2nd Times the Charm - Russian Injection Through Filezilla Client

Andrew Scherer

MarketersCenter.com
Feb 12, 2009
5,778
124
0
Mexico
www.marketerscenter.com
Man this happend to me about 3-4 months ago and now again.

What other alternatives do I have for an FTP client?

Russian injection spam somehow connects to my FTP clients and hoses all of my sites. Banking up the lot is a pain in the butt, not to mention the $$$ losses.

Anyone have some advice here?
 


Yeah, there has been som fucking strange activity with my LZ aswell, hope these fuckers just stay the fuck away.
 
Yeah run only sftp to your server and DON'T save your passwords. Or at least don't save them in Filezilla.

You could get a little crafty and setup a virtual desktop of your choice with something like VirtualBox, and use if for one thing, connecting to your ftp and storing your passwords.
 
Yeah secure FTP, change passwords at the end of each week, and Linux based OS for the PC that you connect to your servers on.
 
Stop downloading apps from warez/torrent sites and the problem will magically solve itself ;)

Seriously, you can see the people behind these attacks talking about it openly on antichat.ru. Most of the FTP jackings are being done via distributing applications on the torrent sites, some guy is even selling some software to automate it all (with captcha breaking!).

They sell them as "shells" which basically means they own all your stuff, the pharmacy/wow gold guys use them for parasite hosting and PR backlinks, everybody else uses it for iframing your visitors to the gumblar exploit code.
 
Download WinSCP.
Use SFTP, every time. If you have SSH access, use SCP instead. Never ever ever ever ever ever evrrrrrr connect to a server with plaintext. Also, probably don't save that plaintext password unencrypted in your FTP client.
 
Yesterday I noticed a new SITE/PASS in my FileZilla:

Site Profile Name: Vizda
Host: Vidza.net
User: Vidza
Pass: 12 Characters Hidden

I hit up Vidza.net and it looks like the host took them down and account terminated - probably for doing maliscious/illegal stuff. I have no clue how this account got into my FileZilla client and I have never downloaded ANY torrent/warez from this computer.

I'm also running ESOT NOD32 did a complete scan and found nothing. Recommendations?
 
Verify checksums whenever you can on stuff you d/l, even from places like open source mirrors.

The really sneaky ones will run a silent install x seconds after completion of the install routine of whatever it is you thought you downloaded. The setup.exe is really a binder in disguise, and may not get picked up by the scanners for a long time (weeks, months).

The reason it doesn't show up is because each exe is crypt'd and compiled separately for each source location(PPI affiliate, etc.). When it finally does get caught by the scanners, it's only gonna be able to catch the things that came from that particular source. Kinda like the common cold virus. You keep getting it because it rarely has the same footprint.

Fortunately, most of the people doing this are the ones you see at BHW saying "OMFGZ WTF is a aDsenZe!!1" and use iexpress at default settings to make the binders. All you have to do is look at the file properties and you will see it is a self-extracting archive instead of a setup exe.

Or they may not bind them at all. You will see these on P2P, masquerading as a file named something like yoursong.exe and weighing in at ~17Kb. This is what I like to call "fishing with a bare hook."


But if someone knows what they are doing, they can use more elaborate methods to disguise it like changing the icons, hacking up the resource files, matching the filesize to the real exe and changing the modified/creation dates. Can also delay the install of the payload and name the process the same as a commonly-used one. This is usually enough to pass by the moderately tech-savvy users.

They can't duplicate the checksum though, at least not yet. Also, you can use something like sandboxie to isolate the install and watch the processes.
 
lol sneaky Russians... No but if you guys need anything translated I will be glad to help. :D
 
Prevx is awesome, researchers (ok, security bloggers) have thrown everything at it and it's never missed. I highly recommend it.
 
I use Filezilla for normal FTP stuff to my sites. I don't download warez or any other malicious crap. Do I need to be worried about anything? or take any pre-cautions? I'm ignorant to a lot of the security jargon on this thread. I have my host name, username and password stored in Filezilla. Just want to be safe.
 
I use Filezilla for normal FTP stuff to my sites. I don't download warez or any other malicious crap. Do I need to be worried about anything? or take any pre-cautions? I'm ignorant to a lot of the security jargon on this thread. I have my host name, username and password stored in Filezilla. Just want to be safe.

Yes you should worry, I'm using Filezilla either,
I don't download warez and I scan my computer regularly
for malware and spyware and shit, yet I got this problem.
check my website: Index of / if you'll surf to it from google or chrome,
It will show you "Warning: Visiting this site may harm your computer!"

I'm trying to change all my passwords now,
I uninstalled filezilla, I'll try SmartFTP now, see how it goes.

besides that I deleted all my current files on this servers, after changing the passwords,
I'll try to reupload them and ask google to review my sites again.

should I do anything else?