Saturday, December 06, 2008
For months, the Proxy List has been inadvertently tracking the spread of the Koobface virus.
Koobface is spread via the social engineering of Facebook users, prompting them to view a video of themselves that requires (surprise) the installation of an "updated" (translation: BOGUS) Flash player that subsequently zombifies the user's computer, installing a proxy server (tinyproxy.exe) running on TCP port 9090.
Koobface was allegedly discovered in August 2008. The Proxy List has been reporting proxies on port 9090 since March 2008 (to be exact, three days after the beginning of the Proxy Project).
Granted, a proxy on port 9090 does not imply that tinyproxy.exe is running on that port, but given anti-virus companies are so far behind the curve on protecting consumers from malware, a five-month "0day" status is not unheard of.
According to my proxy database, port 9090 started in March, ticked up in April, took the months of May and June off, and started rising from July through October. In November, it exploded. So much that port 9090 is now the fifth most common port for verified proxies (meaning, they worked at least once) in the database, only a few hundred away from knocking port 3128 (SQUID, CoDeeN) off the #4 spot.
Not surprisingly, the top three infected countries (US, GB, CA) are all English-speaking. The DNS names, with a handfull of exceptions, all reflect consumer ISPs.
There is some serious Facebook ownage going on, and this probably explains the surge in Cameroon users I reported last week.
Is it advisory-worthy? No. The press has been doing a fair job of getting the word out. The security discussion lists (BugTraq, FullDisclosure, et al) have been, as usual, silent/worthless on the entire subject. That's what really pisses me off. I spend a great deal of time sifting through the lists for security information and 90% of that turns out to be wasted effort. In fact, 100% of the information on Koobface came from my own Google Alerts and independent research.
Why do I bother?
Posted by Hinky Dink at 7:18 AM
Subscribe to: Post Comments (Atom)
hinky you seem to be off duty therevare no transparent ip again and your site seems getting of maintainanceReplyDelete
I have been hard at work making the Proxy List as maintenance-free as possible, but I do admit to having broken some things.ReplyDelete
Lately it has been fine.
You need to check out http://proxyobsession.net, which is the new site for news about the proxy list project.
please Hinky, can you supply some more uk proxies, we need dem badlyReplyDelete
I don't go around scanning countires for proxies.ReplyDelete
What I do is scan all the proxy lists I can get my hands on and then find the working proxies in those lists.
If those lists don't have UK proxies in them, neither does my list.
Hinky,Please we need more port 8080 for united states proxies.PleaseReplyDelete
Have you tried proxy4all.blogspot.com?ReplyDelete
hi mr hinky,ReplyDelete
this is the spirit master of scamming.i used ultra surf to browse using mtn network.it permit me to browse without paying but is not that powerful.
please help me with the most powerful proxy server that can help bypass the mtn server.my email is (firstname.lastname@example.org).
keep being bless for helpping us.........
u all can use..proxy4all.blogspot.comReplyDelete
the best proxies sites on net are published,...
Hello Mr Hinky Dink...is that a Devo reference?ReplyDelete
Hello Mr Hinky Dink,ReplyDelete
I love what you are doing but can i have a very good us ip i wants to sell my puppies so pls you can email me at ( email@example.com).