Gumblar is essentially a combination of exploit scripts and malware that collectively work together to infect and spread. The name Gumblar was given to this attack as the first series of malware were downloaded from a Chinese domain name gumblar.cn hosted on a server based in U.K. Subsequently the attacker moved to another domain name martuz.cn and started delivering the malicious payload from there. Now there are several domains hosting the malware some 1500+, many of whom are actually innocent victims themselves.
Gumblar is a kind of code injection attack where the hacker introduces malicious code in the victim's website files. The attack happens when the computer of the website owner or administrator is compromised and used to upload malicious content to his website hosting server after gaining access to his ftp login credentials. Malicious code is embedded in html, PHP and Javascript files on the web server. So, anyone visiting the website is subjected to the risk of being attacked.
Despite having surfaced way back in 2009, the Gumblar attack exists even today due to its continuing evolution and the manner in which it operates. Here is a simplified description of how gumblar operates.
The unique stealth mechanism of gumblar is that the malicious script that is embedded in web pages is obfuscated. Obfuscation makes it difficult for security tools or anti-virus programs to detect and analyze the malware. Further, the attacker generates obfuscated Javascript dynamically, thus embedding a different script in each infected page of the victim's website. Not only does the script vary from site to site but it can also vary from page to page on the same site, though they all deliver the same result. Since each embedded script is different, it is difficult for anti-malware software to match it with any known signature and hence difficult to detect and automatically remove.
The sites that the embedded gumblar script connects to also changes frequently, due to the very manner in which gumblar operates. Gumblar makes victim webservers as hosts for the malwares that are downloaded on victim's computer. Since new victims keep getting added as it spreads, the sites that the embedded script connects to keep changing. Further, since the victim websites are legitimate sites and known and trusted by other web visitors, the visiting users will never suspect the web pages they download from such sites and may unknowingly invoke the spread.
Needless to mention that the gumblar hacker initially targeted popular websites so as to accelerate the spread. One of the first such victim sites was Yahoo.
It should be noted that the infection due to Gumblar attack is not because to any web server vulnerability. Most hosting providers do enforce stringent security measures to safeguard your data. The attack is perpetrated through stolen FTP login credentials. It transmits FTP information to the hacker's IP address, from an infected machine. This FTP information is then used to log in to the web server and infect the hosted website. So, the infection is not a server-wide exploit. It will only infect sites on the server that it has passwords to.
Given the nature and scope of this attack, it is important that proper security measures be taken at all levels to prevent it. I would like to suggest a few steps that would reduce the vulnerability of your computer and remove existing threats. Note that you will become a victim only if you are a web master who is accessing web servers via FTP. If you are a mere website visitor and do not have anything to do with uploading website files, you will be unaffected by this attack.
How to keep your personal computer protected from hackers
How to move your Email accounts from one hosting provider to another without losing any mails?
How to resolve the issue of receiving same email message multiple times when using Outlook?
Self Referential Data Structure in C - create a singly linked list
Mosquito Demystified - interesting facts about mosquitoes
Elements of the C Language - Identifiers, Keywords, Data types and Data objects
How to pass Structure as a parameter to a function in C?
Rajeev Kumar is the primary author of How2Lab. He is a B.Tech. from IIT Kanpur with several years of experience in IT education and Software development. He has taught a wide spectrum of people including fresh young talents, students of premier engineering colleges & management institutes, and IT professionals.
Rajeev has founded Computer Solutions & Web Services Worldwide. He has hands-on experience of building variety of websites and business applications, that include - SaaS based erp & e-commerce systems, and cloud deployed operations management software for health-care, manufacturing and other industries.