backdoor trojan in ICKill
----Forwarded text-------------------------------------------------- Subject: backdoor trojan in ICKill Date: Sun, 7 Jun 1998 19:44:28 -0400 From: Bachrach <bachrach@netreach.net> To: BUGTRAQ@NETSPACE.ORG First off, I'm not 100% sure if this is the apropriate forum for this since it's not really a weakness, but rather a programmer who is putting backdoors into some programs. Then again technically that's an exploits... Oh I don't know. If this is the wrong place then I apologize profusely for the waste of bandwidth and plead ignorance, but here goes: Well, chances are none of you guys have ever used this program, or even heard of it, but there are alot (35,000) of people who have. I originally downloaded it becasue I've been researching a lot of the weaknesses in the ICQ protocol, (which has become easier as time has gone on. :)) Anyway, after you run it, (ICKill), it creates a file in the directory called 1.exe that acts as a fake explorer. 1.exe accesses your regedit database, and copies itself to windows/system. It changes the regedit so that the fake one will run on startup. It acts mostly the same as the normal explorer with one very crucial execption. It contacts a host (I still can't figure out which one), and executes the commands that are embedded within a text file on the computer. Anyone see it yet? Backdoor city. I contacted the author (who left his e-mail address in the readme), and he's the one who explained th backdoor thing. He also told me a few other things that made me write up to this group. He said that he had gotten almost 35,000 different people's systems calling up his computer at one point; essentuially he has backdoors to 35,000 systems accross the globe. When I asked him why he would go through all the trouble to do this he gave me two reasons: 1. IF (and he emphasized the if) he was a hacker he could use a couple of other people's computers as hops when hacking into a system. Kind of nasty for the sysadmin trying to trace a breaking huh? 2. To quote him "And the backdoors can auto-uptade themselves.. so Imagine I can code a virus like backdoor... Whoaaa! This will be like THAT internet worm.." 3. He also said "Imagine also.. 35,000 backdoored (yeah, I reached this number) connections pinging or SYN flooding some server.." Well if anyone out there is using or has ever used ICKill then get rid of it. I have actually set up a page on this to both inform people and explain how to get rid of all traces of the program that I currently am able to at http://members.tripod.com/~hakz/ICQ/index.html That site also has all of the letters I wrote to him and he wrote to me if you want to see the entire things. It's also got some other info I couldn't fit into this message, including all of the mistakes the author made (guess he needed better beta testing). My last question is this: if one person has backdoors into thousands of computer systems, doesn't that pose some sort of risk to the interent community as a whole? There's one person who's been saying that I should notify the FBI about this. As you can see decided to start here first.
At 11:00 PM 6/10/98 +0200, a remailer user forwarded a message From: Bachrach <bachrach@netreach.net> about a major security backdoor in ICKill, a utility that apparently augments or hangs around ICQ - it's a little-documented feature designed into the system rather than a bug or unexpected behaviour. More information is at
http://members.tripod.com/~hakz/ICQ/index.html ... My last question is this: if one person has backdoors into thousands of computer systems, doesn't that pose some sort of risk to the interent community as a whole? There's one person who's been saying that I should notify the FBI about this. As you can see decided to start here first.
Don't tell the FBI - they'll just want to use it themselves. :-! Is there some way to locate and reach ICKill users directly? Do they show up on ICQ in some useful manner? (I don't use either of the products....) Directly notifying them could help the problem, or at least generate a number of emails to the author who put the feature in there. Thanks! Bill Bill Stewart, bill.stewart@pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
At 11:00 PM 6/10/98 +0200, a remailer user forwarded a message From: Bachrach <bachrach@netreach.net> about a major security backdoor in ICKill, a utility that apparently augments or hangs around ICQ - it's a little-documented feature designed into the system rather than a bug or unexpected behaviour. More information is at
http://members.tripod.com/~hakz/ICQ/index.html .... My last question is this: if one person has backdoors into thousands of computer systems, doesn't that pose some sort of risk to the interent community as a whole? There's one person who's been saying that I should notify the FBI about this. As you can see decided to start here first.
Don't tell the FBI - they'll just want to use it themselves. :-!
Is there some way to locate and reach ICKill users directly? Do they show up on ICQ in some useful manner? (I don't use either of the products....) Directly notifying them could help the problem, or at least generate a number of emails to the author who put the feature in there.
Well the way I see it the author of ICKill told the company that puts out ICQ that you have this problem and you need to fix it.. The way he's looking at it is fix this because it's a problem. They did not fix it after his requests to have them fix this so he shared it. I don't think he did anything wrong in this case. Any way like the FBI could figure out how to use it I don't give them that much credit as it is. |)ark |(night DEFINITION. Windows 95: n. 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor, written by a 2 bit company, that can't stand 1 bit of competition. Http://www.EliteHackers.org/DarkKnight
participants (3)
-
Bill Stewart
-
Dark Knight
-
nobody@REPLAY.COM