---

Trojan Found in libpcap and tcpdump

[ Thanks to LogError for this link.
]

“Members of The Houston Linux Users Group discovered that the
newest sources of libpcap and tcpdump available from tcpdump.org
were contaminated with trojan code. HLUG has notified the
maintainers of tcpdump.org.

“Details:

  • “The trojan contains modifications to the configure script and
    gencode.c (in libpcap only).
  • The configure script downloads
    http://mars.raketti.net/~mash/services which is then sourced with
    the shell. It contains an embedded shell script that creates a C
    file, and compiles it.
  • The program connects to 212.146.0.34 (mars.raketti.net) on port
    1963 and reads one of three one byte status codes:

    A – program exits
    D – forks and spawns a shell and does the needed file descriptor
    manipulation to redirect it to the existing connection to
    212.146.0.34.
    M – closes connection, sleeps 3600 seconds, and then
    reconnects…”

Complete
Story

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis