Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Sub7

From Wikipedia, the free encyclopedia
Trojan horse and remote access software
For the band, seeSubseven.
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Sub7" – news ·newspapers ·books ·scholar ·JSTOR
(April 2014) (Learn how and when to remove this message)
Sub7
Original author(s)mobman
Preview release
2.3 / 2010
Written inDelphi
Operating systemMicrosoft Windows
TypeTrojan horse (computing)
Websitesub7crew.org
Sub7
ClassificationTrojan horse (computing)
Authorsmobman
Technical details
PlatformMicrosoft Windows
Written inDelphi

Sub7, orSubSeven orSub7Server, is aTrojan horse - more specifically aRemote Trojan Horse - program originally released in February 1999.[1][2][3]

Because its typical use is to allow undetected and unauthorized access, Sub7 is usually described as atrojan horse by security experts.[4][2][5][6][7][8] Starting with version 2.1 (1999) it could be controlled viaIRC. As one security book phrased it: "This set the stage for all maliciousbotnets to come."[6] Additionally Sub7 has some features deemed of little use in legitimate remote administration likekeystroke logging.[6]

Sub7 worked on theWindows 9x and on theWindows NT family of operating systems, up to and includingWindows 8.1.[7]

History

[edit]

SubSeven was developed by mobman, a computer programmer originally from Craiova, Romania.[9]

Mobman released SubSeven on February 28, 1999. His first edition was titled SubSeven v1.0 carried echos of another Trojan of the time,Back Orifice (BO). Mobman described SubSeven as a clone of BO. The inaugural branch of versions v1.0 to v1.9 restricted user experience to a single window, making them straightforward and easy to use. In an experimental version of 1.9, the SubSeven 1.9Apocalypse, Mobman revamped the previous blue/purple design that had been in use since v1.5.

In 2001, in an attempt to reinvent the design again, the v2.2x branch was created. It proved to be short-lived as its modular approach allowing for the creation of plugins and custom features did not resonate with users who lacked either the skills or the motivation to create new extensions and plugins. Thus, Mobman decided to continue the 2.1.x branch. In 2003 2.1.5, known as the "SubSeven Legends", marked the end of SubSeven development under Mobman.[3]

In 2006 (sub7legends.net) re-opened with hundreds of thousands of users, and has kept Sub7 alive with clean downloads and support and new software releases.

No development had occurred for several years until version 2.3 in 2010. This release was based on the genuine SubSeven 2.2 and 2.1.3 source code, which mobman himself shared to his close friends, "Read101" and "fc" and were responsible for this update. Unfortunately, the reborn did not capture the public's attention as anticipated. This lack of interest was primarily due to "fc", who was more interested in monetizing the new version than enhancing its quality.[10]

SubSeven 2.3, released on March 9, 2010, was revamped to work on all 32-bit and 64-bit versions of Windows and includes TCP Tunnel and Password Recovery for browsers, instant messengers and email clients. It was very buggy. The website that claimed to do this is no longer active.

In June 2021, Jean-Pierre Lesueur (DarkCoderSc) released from scratch a complete remake of SubSeven version 2.2. This version maintained a similar look and feel to the original. Since then, development has ceased, and the source code has been made available to the public.[11]

In October 2023, "IllWill", a former member of the Sub7 Crew from the 1990s and early 2000s, delivered a talk at BSides CT 2023.[12] This presentation delved into the story behind mobman, revealing several unknown facts about the mysterious developer. The talk concluded with IllWill releasing the official and genuine source code of SubSeven 2.1.2/3 in his Gitlab.[13] This release was made possible by mobman's direct contribution and with his blessing.

As of now, no other versions of SubSeven have been officially released, apart from version 2.1.2/3 by IllWill. The SubSeven 2.2 version remains exclusively in the possession of mobman, Read101, fc, and DarkCoderSc.

In a 2013 article ofRolling Stone, mobman was identified to be an American man.[14] In an October 2024 episode of the podcastDarknet Diaries, a man claiming to be from Romania and residing in Canada and to be the real mobman confronted the American, pointing out inconsistencies in his story such as that the first version of Sub7 said "FromWindsor, Ontario", to which the American said he had never been.[15]

Architecture and features

[edit]

Like other remote admin programs, Sub7 is distributed with aserver and aclient. The server is the program that the host must run in order to have their machines controlled remotely, and the client is the program with aGUI that the user runs on their own machine to control the server/host PC. Computer security expertSteve Gibson once said that with these features, Sub7 allows a hacker to take "virtually complete control" over a computer. Sub7 is so invasive, he said, that anyone with it on their computer "might as well have the hacker standing right next to them" while using their computer.[16]

Sub7 has more features thanNetbus (webcam capture, multiple port redirect, user-friendly registry editor, chat and more).

According to a security analysis,[17] Sub7's server-side (target computer) features include:

  • Recording:
    • Sound files from a microphone attached to the machine
    • Images from an attached video camera
    • Screen shots of the computer
  • Retrieving a listing of recorded and cached passwords
  • Taking over anICQ account used on the target machine (back then the most popular messaging service); added in version 2.1. This included the ability to disable the local use of the account and read the chat history
  • Features which were presumably intended to be used for prank or irritating purposes including:
    • Changing desktop colors
    • Opening and closing the optical drive
    • Swapping the mouse buttons
    • Turning the monitor off/on
    • "text2speech" voice synthesizer which allowed the remote controller to have the computer "talk" to its user
  • Penetration testing features, including aport scanner and aport redirector

On the client-side the software had an "address book" that allowed the controller to know when the target computers are online. Additionally the server program could be customized before being delivered by a so-called server editor (an idea borrowed fromBack Orifice 2000). Customizations possible with the Sub7 server editor included changing the port addresses, displaying a customized message upon installation that could be used for example "to deceive the victim and mask the true intent of the program".[17] The Sub7 server could also be configured to notify the controller ofIP address changes of the host machine by email, ICQ or IRC.[18]

Connections to Sub7 servers can be password protected with a chosen password.[18] A deeperreverse engineering analysis revealed however that "SubSeven's author has secretly included a hardcoded master password for all of his Trojans! The Trojan itself has been Trojaned".[8] For Version 1.9 the master password is predatox and 14438136782715101980 for versions 2.1 through 2.2b. The Master Password for SubSeven DEFCON8 2.1 Backdoor is acidphreak.[19]

Uses and incidents

[edit]

SubSeven has been used to gain unauthorized access to computers since it also worked as a keylogger. While it can be used for causing mischief (such as making sound files play out of nowhere, changing screen colors, etc.), it can also read keystrokes that were made since the last boot—a capability that can be used to steal passwords, credit card numbers, and other sensitive data.[20]

In 2003, a hacker began distributing a Spanish-language email purporting to be from security firmSymantec that was used to trick recipients into downloading Sub7.[21]

Although Sub7 is not itself aworm (it has no built-in self-propagation features) it has been leveraged by some worms such as W32/Leaves (2001).[5][22]

Some versions of Sub7 include code from Hard Drive Killer Pro to format the hard drive; this code will only run if it matches theICQ number of "7889118" (mobman's rival trojan author.)[23]

See also

[edit]

References

[edit]
  1. ^"Sub7 Legacy".www.sub7crew.org. Retrieved2021-06-19.
  2. ^abJohn R. Vacca (2013).Network and System Security (2nd ed.). Elsevier. p. 63.ISBN 978-0-12-416695-0.
  3. ^abLesueur, Jean-Pierre (July 18, 2023)."A Malware restrospective : SubSeven".Medium.
  4. ^Christopher A. Crayton (2003).Security+ Exam Guide. Cengage Learning. p. 340.ISBN 1-58450-251-7.
  5. ^abMohssen Mohammed; Al-Sakib Khan Pathan (July 2013).Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks. CRC Press. p. 105.ISBN 978-1-4822-1905-0.
  6. ^abcCraig Schiller; James R. Binkley (2011).Botnets: The Killer Web Applications. Syngress. p. 8.ISBN 978-0-08-050023-2.
  7. ^abDiane Barrett; Todd King (2005).Computer Networking Illuminated. Jones & Bartlett Learning. pp. 521–.ISBN 978-0-7637-2676-8.
  8. ^abCyrus Peikari; Anton Chuvakin (2004).Security Warrior. O'Reilly Media. p. 31.ISBN 978-0-596-55239-8.
  9. ^"A Malware retrospective: SubSeven".medium.com. Retrieved2024-02-05.
  10. ^"A Malware retrospective: SubSeven".medium.com. Retrieved2024-02-05.
  11. ^"Sub7 Legacy".www.github.com. Retrieved2021-06-19.
  12. ^"BSides CT 2023 - illwill: FINDING MOBMAN".www.youtube.com. Retrieved2023-10-07.
  13. ^"Sub7".www.gitlab.com. Retrieved2023-10-07.
  14. ^Kushner, David (September 2013)."The Geeks on the Front Lines".Rolling Stone. Retrieved2024-10-03.
  15. ^Rhysider, Jack (2024-10-01)."EP 150: mobman 2".Darknet Diaries. Retrieved2024-10-02.
  16. ^Gibson, Steve.The strange tale of the denial of service attacks on grc.com. 2002-03-05.
  17. ^abCrapanzano, Jamie (2003), "Deconstructing SubSeven, the Trojan Horse of Choice.,SANS Institute Information Security Reading
  18. ^abEric Cole (2002).Hackers Beware. Sams Publishing. p. 569.ISBN 978-0-7357-1009-2.
  19. ^SANS, A Risk to Your Internet Security Chapter Name: "The Inner Workings of Sub7" on page 14 notes several master passwords used.
  20. ^Sub7 analysis fromSophos
  21. ^"Symantec report on Sub7". Symantec.com. Archived fromthe original on November 10, 2006. Retrieved2012-08-28.
  22. ^"The CERT Division | Software Engineering Institute".
  23. ^admin (2018-12-14)."Who is the real mobman?".illmob. Retrieved2020-07-15.

External links

[edit]
General
Implementations
Controversial Implementations
Retrieved from "https://en.wikipedia.org/w/index.php?title=Sub7&oldid=1272182379"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp