HackDig : Dig high-quality web security articles for hackers

Linux Mint Website Hack: A Timeline of Events

2016-02-21 16:15

Last night, the Linux Mint team announced that someone had hacked their servers and started pointing user downloads to malicious ISO images for the Linux Mint 17.3 Cinnamon edition. Our Linux editor already covered the initial details of the attack, which we recommend reading before going forward with this article.

Since then, in the last ten hours, the Linux and infosec communities have been working hard to investigate what happened and how the hackers operated. While most of the details have been uncovered, people are still debating about the hackers' point of entry.

Linux Mint Team: They hacked us via our WordPress site

The first to provide an answer was Clement Lefebvre, leader of the Linux Mint project, who acknowledged in a comment on the official announcement that the initial point of entry was their WordPress blog.

In this scenario, the hackers managed to escalate their access to the underlying server and finally get shell access to www-data. From here they modified the Linux Mint download page to point to a malicious FTP server hosted in Bulgaria (IP: 5.104.175.212).

The Linux Mint team discovered the issue, cleaned up the links from their site, announced the data breach on their blog, and then it appears that the hackers re-compromised the download page again.

During the second compromise, all Linux Mint download mirrors were pointing to the same Bulgarian FTP IP
During the second compromise, all Linux Mint download mirrors were pointing to the same Bulgarian FTP IP

Seeing that they've failed to eliminate the hackers' true point of entry, the Linux Mint team decided to take down the entire linuxmint.com domain to avoid the ISO images from spreading to users that had not seen its security alert.

InfoSec Community: They've hacked you via your phpBB forum

The other theory for the hackers' point of entry was put forward by the infosec community. Yonathan Klijnsma, senior threat intelligence analyst for Fox-IT, a Dutch security firm, has noticed that a few hours prior to the Linux Mint announcement, someone had posted an ad on the TheRealDeal Dark Web marketplace.

Someone with the peace_of_mind username was selling the "Linuxmint.com shell, php mailer, and full forum dump" for 0.1910 Bitcoin (~$85) (image at the end of the article).

One person seems to have bought the hackers' files and dumped the forum's config file on Hacker News discussions thread.

code
  // phpBB 3.0.x auto-generated configuration file
  // Do not change anything in this file!
  $dbms = 'mysql';
  $dbhost = 'localhost';
  $dbport = '';
  $dbname = 'lms14';
  $dbuser = 'lms14';
  $dbpasswd = 'upMint';
Malicious Linux Mint ISOs contained a DDoSing bot

As for the compromised ISOs, the hackers have only altered the man.cy file, where they've added a new function called tsunami. This is a well-known Linux ELF trojan named TSUNAMI that's a simple IRC bot used for launching DDoS attacks. The trojan was first spotted and analyzed in 2013. A technical write-up of its capabilities is available here.

The fact that the hackers opted to infect a top-shelf Linux distro with a simplistic IRC bot (something considered to be outdated in the early 2010s) leads us to conclude that this is the work of an inexperienced group.

Selling the forum's database for a meager $85 is a sign of their lack of vision. The group seems to have mishandled the entire hack, opting to distribute a silly IRC DDoS bot instead of more dangerous and lucrative malware like Bitcoin miners or banking trojans.

The fact that they've re-compromised the site after they've been originally discovered also shows the group's lack of experience. With their entry point still working, and with the Linux Mint team blaming the WordPress site, when all clues pointed to the phpBB forum, all the hackers had to do was to wait.

Instead, they escalated the entire incident, placed ads on an underground hacking forum, which eventually caught the eye of security experts and forced the Linux Mint team to bring down their entire website, cutting off their access.

UPDATE: Just after our article went live, Mr. Lefebvre confirmed that the malicious Linux Mint ISOs contained the TSUNAMI IRC bot.

Linux Mint forum DB available for sale on the Dark Web
Linux Mint forum DB available for sale on the Dark Web


Source: WZtlGdtEWLrNWYo1SZ0l2ciV2dtQnbp1WL4Vnbpx2LzdXZu9SbvNmLhlGZlBHdm92cuM3dl52LvoDc0RHa/ca.ssr.dps

Read:4374 | Comments:0 | Tags:Incidents

“Linux Mint Website Hack: A Timeline of Events”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Tools

Tag Cloud