小心!上当"蜘蛛"在线疯狂搞颜色,误点即刻掉入诈骗漩涡
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">互联网信息服务(Internet Information Services)<span style="color: black;">是由于</span>微软<span style="color: black;">机构</span><span style="color: black;">供给</span>的基于运行Microsoft Windows的互联网基本服务,大<span style="color: black;">都数</span>Windows系统服务器均有安装,常用来运行Web服务。而当这一底层架构被恶意黑客盯上,网络威胁自然随之而来。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/c7eadd7b5c1e4440abb639f74f631a7a~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=%2FC6iLk0JSAAhqSnUum4XNwNP7Mc%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">近期</span>,360安全大脑独家<span style="color: black;">发掘</span>一新型恶意模块,被黑客<span style="color: black;">移植</span>其攻陷的IIS WEB服务器,并利用该恶意模块替换IIS服务中的一个服务组件,躲避检测查杀。经360安全大脑分析,<span style="color: black;">这次</span>攻击事件最早<span style="color: black;">起始</span>于2020年8月,黑客攻陷数个知名云服务<span style="color: black;">供给</span>商的数十台服务器,受影响网站数量高达几千例,360安全大脑<span style="color: black;">第1</span>时间发出紧急安全预警。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">攻陷公用云主机服务器,"染毒蜘蛛"过境数千网站</strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">360安全大脑分析<span style="color: black;">发掘</span>,被攻击服务器<span style="color: black;">重点</span>为公用云主机服务器,且<span style="color: black;">一般</span>黑客攻陷一个公用云主机服务器后,<span style="color: black;">就可</span>直接<span style="color: black;">得到</span>几十<span style="color: black;">乃至</span>上百个网站的<span style="color: black;">掌控</span>权,其中不乏企业官网。360安全大脑监测数据<span style="color: black;">表示</span>,此次遭攻击服务器高达数十台,几千个网站受波及。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/6a7bd556ab96433e8c339ab59db2939c~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=razRl4N3n8DB56RchO858nbvIYE%3D" style="width: 50%; margin-bottom: 20px;">
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">(部分受害企业)</p>
</div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">鉴于<span style="color: black;">以上</span><span style="color: black;">状况</span>,360安全大脑<span style="color: black;">第1</span>时间对样本展开分析,随后<span style="color: black;">发掘</span>黑客在攻陷<span style="color: black;">目的</span>服务器后,会从网上下载一个<span style="color: black;">包括</span>db.db、dd.cc、e.cc模块、x64.dd、x86.dd五个文件的恶意压缩包,各文件功能<span style="color: black;">详细</span>如下:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">db.db 是一个SQLite3数据库文件。<span style="color: black;">重点</span><span style="color: black;">包括</span>恶意模块需要的网站模版及关键字等信息,此文件后续会被写入IIS目录下的inetsrv\modrqflt.dll:db.db文件中,这是一个<span style="color: black;">持有</span></p>FILE_ATTRIBUTE_INTEGRITY_STREAM属性的文件,在目录下不可见。
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">dd.cc是黑客<span style="color: black;">研发</span>的恶意模块安装工具。黑客<span style="color: black;">运用</span>该工具可改变modrqflt.dll的<span style="color: black;">拜访</span><span style="color: black;">掌控</span>权限(DACL),从而成功将modrqflt.dll重命名为cache.dll,并将恶意程序改名为modrqflt.dll。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">e.cc模块是用来停止被攻陷服务器日志记录的功能。运行之后,其会遍历线程找到Eventlog服务的线程并停止,以此来停止日志记录的功能。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">x64.dd为黑客编写的64位恶意modrqflt.dll,<span style="color: black;">重点</span>用来替换C:\Windows\System32\inetsrv下iis服务器自带的modrqflt.dll。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">x86.dd 则是黑客编写的32位恶意modrqflt.dll,<span style="color: black;">重点</span>用来替换C:\Windows\SysWOW64\inetsrv下的modrqflt.dll。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/5f77069f7fe54eb980271f9fead12a4a~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=FwYiyrn0HinKPWFcQQJRh%2BHr2aM%3D" style="width: 50%; margin-bottom: 20px;">
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">(黑客攻陷<span style="color: black;">目的</span>服务器后下载的恶意压缩包)</p>
</div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">modrqflt.dll是<span style="color: black;">供给</span>请求过滤处理(Request filtering handler)的功能模块,而成功替换后,黑客便<span style="color: black;">能够</span>过滤掉网站正常<span style="color: black;">拜访</span>请求,专门为搜索引擎蜘蛛(爬虫)<span style="color: black;">供给</span>色情素材。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/fe09099069904aef9e51cc5eb3ed77c5~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=hgHRszIOJaJCgo7EcIGMF2H9aTg%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">完成恶意模块的替换后,当搜索引擎蜘蛛(爬虫)<span style="color: black;">拜访</span>网站<span style="color: black;">本来</span>失效链接时,此模块即会生成一个<span style="color: black;">包括</span><span style="color: black;">海量</span>链接的"空白"页面,并将HTTP响应码由404改为200来<span style="color: black;">诈骗</span>"蜘蛛"(爬虫)。而"蜘蛛"在获取该页面后,会继续<span style="color: black;">拜访</span>页面中的所有链接,并抽取关键字存入搜索数据库。此时,<span style="color: black;">倘若</span>有用户搜索对应关键词,就会返回<span style="color: black;">以上</span>伪造链接及页面,<span style="color: black;">倘若</span>恶意DLL仍然存在,则会直接<span style="color: black;">转</span>到色情网站。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">空白页面神隐"透明"网址,骗过爬虫蜘蛛猖狂搞颜色</strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">404页面并不少见,<span style="color: black;">一般</span>是<span style="color: black;">因为</span>服务器<span style="color: black;">位置</span>变动,<span style="color: black;">或</span><span style="color: black;">守护</span>不到位等<span style="color: black;">原因</span><span style="color: black;">引起</span>网站个别链接失效。正常<span style="color: black;">状况</span>下,当搜索引擎蜘蛛爬取时遇到此类链接,<span style="color: black;">亦</span>会<span style="color: black;">表示</span>404页面,但<span style="color: black;">针对</span>遭遇黑客攻陷的网站<span style="color: black;">来讲</span>,其失效链接则会骗过"蜘蛛",<span style="color: black;">表示</span>空白页面却在源码中暗藏<span style="color: black;">海量</span>链接。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/d762de584e214539adeef42928dfc2c3~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=j1PFQnhtUQhbtey1gBxd%2ByFb%2FKY%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">看到<span style="color: black;">这儿</span>你或许会有疑问,中招的网站怎么区分正常的用户和爬虫呢?其实当用户<span style="color: black;">运用</span>浏览器打开一个网站,浏览器向网站服务器发出请求时,会在请求数据头部设置一个User-Agent的字段,例如<span style="color: black;">拜访</span>百度时:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/10588cdf13c347b6baee1403fba80e22~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=tFgCIFBrmOY6vwcdyqF1DUnfZkU%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">而当搜索引擎爬取时,User-Agent设置的则有<span style="color: black;">有些</span>不<span style="color: black;">同样</span>:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">百度蜘蛛</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">Mozilla/5.0(compatible;Baiduspider/2.0;+http://www.baidu.com/search/spider.html)</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">360蜘蛛:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36; 360Spider</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">神马蜘蛛:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">搜狗蜘蛛:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">Sogou web spider/4.0(+http://www.sogou.com/docs/help/webmasters.htm#07)</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/83a8cb8d90cc4ea3938440eff9091538~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=%2BYZHqm0rnQ4HVFrCn3RsHKgQxhw%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">此次事件中,<span style="color: black;">违法</span>黑客下载的恶意模块会<span style="color: black;">经过</span>判断User-Agent区分用户和蜘蛛(爬虫),当识别为搜索引擎蜘蛛后,就会返回<span style="color: black;">以上</span>100条链接,其中前80条hostname是恶意模块生成的随机页面,与当前网站的hostname一致;后20条hostname则是其他受害网站生成的随机页面,均为接口</p>hxxp://zjclasjsdknlnxsa.com:8081/ping返回(此接口需要特殊User-Agent<span style="color: black;">才可</span><span style="color: black;">拜访</span>)。
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/a9c9ce4ddf7e4d21b19fbe95319f1b3a~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=sEHDG%2F0nCuVeLCDW58C0Na60YQA%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">与此<span style="color: black;">同期</span>,100条随机生成的页面链接,看似杂乱无章其实暗藏<span style="color: black;">必定</span>规律的,它们的URL<span style="color: black;">通常</span><span style="color: black;">是由于</span>下图中的规则<span style="color: black;">形成</span>,即[]中的为可选。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/fa6a8efff5af41ea88e5d4c6fb450da9~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=HBVN9FK%2BU2fToaAX3RcnVLWZN98%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">参照上图的URL规则,观察随机链接中的path字段会<span style="color: black;">发掘</span>,它们全都是以lista/xzs/api/bks开头,且以上四个关键词,分别对应了四套恶意模块<span style="color: black;">运用</span>网站模版。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p6-sign.toutiaoimg.com/pgc-image/65dfef427be548b2a33aaad6144d8750~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=FIPvCwwub0gGyUCGzr7Nxxs4GNc%3D" style="width: 50%; margin-bottom: 20px;"></div>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p26-sign.toutiaoimg.com/pgc-image/4e3c0e1fc5f14c0d84cd5c7d4a1a2b9d~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=zctMUbxpAbZ7OiZw5eAuqqck4CE%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">在生成网页过程中,程序还会随机读取keyword等其他表中的数据,以此来替换网站模版中的对应留空位置。四套模版运行如下图所示:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/237e434ea8794cc8b6ef386800991903~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=v8jL1kLWHF8WBJLLDCW3D01hNKo%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">以上</span>网页<span style="color: black;">表示</span>内容,都是<span style="color: black;">拜访</span>受害网址时数据库关键字替换随机生成的,搜索引擎蜘蛛(爬虫)则会将<span style="color: black;">以上</span>伪造的URL和页面缓存在数据库中。当用户在搜索引擎中搜索色情关键词,一旦命中<span style="color: black;">以上</span>伪造页面内容,<span style="color: black;">那样</span>搜索引擎就会返回<span style="color: black;">以上</span>伪造的URL和页面摘要。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">此时,如若用户点击页面网址,浏览器则会默认设置Referer字段,以此来标明是从那个链接找到当前的链接。恶意模块正是利用这一点,区分当前<span style="color: black;">拜访</span>页面<span style="color: black;">是不是</span>来自于百度/360/搜狗/神马等国内搜索引擎中的一种。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/2be097e515b948919efcc4b7348f2ce4~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=BmESXtIbaRCiq0YBHxMSfJ1XHLs%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">尤其</span>是,<span style="color: black;">倘若</span>接口</p>hxxp://zjclasjsdknlnxsa.com:8081/jump有返回数据,则会设置页面的内容为接口返回的数据:
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p26-sign.toutiaoimg.com/pgc-image/011f9e57f34a42dface08bbbb9518cc0~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=T1NVnFeJBauKJOQRGxO3zyvdUeM%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">如若<span style="color: black;">无</span>获取到接口数据,则会<span style="color: black;">拜访</span>db.db数据库,将jump中的代码<span style="color: black;">插进</span>网页中:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><script type="text/javascript" src="hxxp://zjclasjsdknlnxsa.com/js/jump.js"></script></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">jump.js内容如下:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/2ece40cd28ea4d7c9d0e9f9278562cef~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=rpiodM6A8krn%2FarK7Jw4oVcvGEE%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">以上</span>代码的<span style="color: black;">重点</span>功能<span style="color: black;">便是</span><span style="color: black;">转</span>到<span style="color: black;">最后</span>的色情网站:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/7e85f288b18b44adbebc4574a758495e~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=12BnzBokyAVYYM%2BhFiERB8Fa9%2F8%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">而当<span style="color: black;">咱们</span>在某搜索引擎搜索受害网站关键词时,点击搜索的链接,打开的<span style="color: black;">便是</span>色情网址hxxps://2**sg.xyz/,虽然原网址完全是一个正规网站。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/89246bf5b8e44b0286d5eaa9ae4882e7~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=2ou91uH5V5%2BhWvJodOTBmJsFyMo%3D" style="width: 50%; margin-bottom: 20px;">
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">(搜索网址为色情网站)</p>
</div>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/40f3379dc8264c629c0a1cdf16cef293~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=iLUR1mzcC8hodlxgF4D3rWPOsDA%3D" style="width: 50%; margin-bottom: 20px;">
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">(受害网站原网址为正规网站)</p>
</div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">黑灰产业链<span style="color: black;">连续</span>发酵,360安全大脑强势出击</strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">经360安全大脑研判分析,此次是黑灰产业链的<span style="color: black;">连续</span>性攻击事件,黑客团伙<span style="color: black;">运用</span>专业的渗透技术对各类网站进行攻击并<span style="color: black;">移植</span>木马,<span style="color: black;">违法</span>获取服务器<span style="color: black;">掌控</span>权,并在随意管控攻陷的肉鸡服务器的<span style="color: black;">基本</span>上,利用搜索引流扩散色情诈骗内容,影响正规网站正常业务运行。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">现<span style="color: black;">周期</span>,黑客团伙攻击仍在<span style="color: black;">连续</span>,广大用户应格外<span style="color: black;">警觉</span>,避免遭受不必要的损失。对此,360安全大脑给出如下安全<span style="color: black;">意见</span>:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">1、尽快前往weishi.360.cn,下载安装360安全卫士,有效拦截各类病毒木马攻击,<span style="color: black;">守护</span>电脑隐私及财产安全;</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">2、注重服务器安全管理,规范安全等级<span style="color: black;">守护</span>工作,<span style="color: black;">即时</span>更新漏洞补丁;</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">3、<span style="color: black;">创立</span>网站安全策略,防止攻击<span style="color: black;">出现</span>时<span style="color: black;">害处</span>进一步扩大。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/992b715127ba48b4abdb83a0bfec16f9~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1725115046&x-signature=JuJE9YiMZRyMoJa41MyPpviFJgk%3D" style="width: 50%; margin-bottom: 20px;"></div>
你说得对,我们一起加油,未来可期。 回顾历史,我们不难发现:无数先辈用鲜血和生命铺就了中华民族复兴的康庄大道。 我赞同你的看法,你的智慧让人佩服,谢谢分享。
页:
[1]