Josh:

Back in 2003, I can still remember my first experience with peer-to-peer file sharing.

I had downloaded and installed a program called LimeWire on my blue Dell Inspiron 1100.

Suddenly, it felt like a whole world was at my fingertips.

All the CDs I owned, and way more, were now in digital format just waiting to be downloaded.

Of course, back then, downloading a single song could take an hour or more,

but still, there was something magical about it.

One thing that sticks out is how I noticed some song files were way smaller than others.

A typical song back then was around 2-3 megabytes,

but I'd see some files that were just 300 bytes, only a fraction of the size they should have been.

I wondered to myself how that was even possible.

Computers were still relatively new to me at the time, so I figured, why not?

I downloaded one of the smaller files, thinking it'd finish faster, and it did.

Way quicker. I double-clicked to play it, but instead of hearing music, a black window flashed

on my screen, and then... nothing. My stomach dropped. I didn't know exactly what just happened,

but I knew it wasn't good. I took a closer look at the file, and that's when I saw it.

The extension was .exe. Not a song file at all. It wasn't until I came across the Fizzer Worm from

2003 that things started to make a bit more sense. From peer-to-peer file sharing,

to key loggers and back doors, on this episode of In The Shell.

Thank you.

.

has caused this outage.

That it takes you longer to do something

by putting it into a computer and calling it up again

than if you just kept simple records yourself in the house.

Fizzer was first discovered on May 8, 2003

by a company named F-Secure.

They're a global security and privacy company

based out of Helsinki, Finland.

Within a few days, it had also been spotted

by Trend Microsystems and Symantec.

They all classified it as one of those

new hybrid viruses,

and no, I don't mean hybrid like the car.

This worm was pretty advanced for its time.

It had its own emailer,

could randomly create IRC and AOL Instant Messenger bot accounts,

and even had the ability to update itself

by connecting to a GeoCities website.

So if the person behind it needed to fix a bug

or add a new feature,

they could easily push those changes

and all the infected machines would download the updates.

In previous episodes,

I've talked about some other worms.

like Code Red and Sequel Slammer. When those were released, they were pretty static, meaning once

an antivirus rule was created to catch them, that was pretty much the end of the story. They'd be

stopped in their tracks. But with Fizzer, the game changed. The person behind it could actually

update the worm. So once antivirus companies released rules to detect it, the malicious actor

could tweak the worm's signature and push out an update, hoping to stay ahead of the infected

user's computers before they even knew what was happening. Speaking of antivirus, Fizzer also had

another trick up its sleeve. It disabled local antivirus software. So even if you had protection

and the latest rules in place, it didn't matter if your antivirus software was turned off.

And to make matters worse, it installed a keylogger. Now a keylogger records every keystroke you type on

your keyboard. Depending on how long you've been online, you might remember some banking or government

websites.

Fizzer, Fizzer, Fizzer, Fizzer, Fizzer, Fizzer, Fizzer, Fizzer. For the first time, you can see it.

Thank you.

making you use an on-screen software keyboard where you'd click to enter your username and

password. That was an attempt to protect users from keyloggers by avoiding physical keyboards.

It was mostly ineffective, which is why you don't see it around much anymore.

But back to Fizzer's keylogger. It saved all the keystrokes to a file called

iservc.klg inside the Windows folder. Later on, the malicious actor would retrieve that file

and run filters on the data, searching for patterns like username and password combinations,

along with credit card numbers. Compared to worms that came before it,

Fizzer was operating on a whole different level.

Let's dive into some of these specifics. When F-Secure first discovered Fizzer on May 8th,

it was spreading through the Kaza file-sharing network in Asia.

And this is what fascinates me about the worm. It found such a clever way to spread.

Peer-to-peer file sharing is pretty much exactly what it sounds like.

You, as a peer, use software to share files and other peers, whether it's me or someone else or

even the NSA, can download those files. So one person shares a file and other people can download

it. Once they download it, those people also become a source for the file. Instead of just

one peer having the file, now 10 different people might have it. It spreads the load and the bandwidth

so that no one person is bogged down. It's a brilliant, legitimate way to share and spread

information quickly. If you've ever downloaded a torrent, it works on a similar concept.

So what Fizzer did was locate the Kaza shared folder on an infected computer

and copy itself there, giving the file random names. Like I mentioned earlier, you might see

something like metallica-enterthesandman.mp3.exe. Anyone who downloaded that file and executed

it was now infected with a worm.

Many Americans use programs like Kaza to download music.

And you can imagine just how quickly that spread. It's like a spider web expanding,

with the file becoming available for download to anyone using Kaza.

And Fizzer wasn't just creating chaos in Asia, it went global.

People from the US to Europe were all getting infected.

Now keep in mind, back then, bandwidth was in pretty short supply.

Honestly, with my local ISP and their data caps, it feels like they want me to still believe it is.

But I digress.

At the time, limited bandwidth meant these malicious actors were essentially crowdsourcing bandwidth

from infected users, getting them to spread the worm for them.

I think that's just incredibly creative. Terrifying. But creative.

And it wasn't just Kaza. Fizzer also exploited Windows network shares.

You know, those shared folders in corporate environments that had pretty terrible security

back then. And let's be honest.

they often still do. If a machine was infected and it had access to a shared folder on your network,

Fizzer could spread through that too. It didn't care who you were, whether you were a home user

downloading songs or a corporate employee, Fizzer was coming for you. Once you were infected, it

didn't stop there. Besides spreading itself through your Kaza shared folder, Fizzer would also email

itself to everyone in your Outlook address book. Sound familiar to anyone? And it didn't just use

your name as the sender, it spoofed the sender name, picking from a list of 200 different names

the worm had built in. The actual email address it used was generated randomly and often came from

domains like hotmail.com, AOL, and a few others. Fizzer also got a little crafty with the email

subjects to entice people to click. While the body of the email was always in English,

the subject line appeared in three languages, English, French,

and German. Here are a few of the subjects I found particularly interesting.

Damn it feels good to be a gangsta. Yo what's up B. Please discard if you don't like or agree

with our present leadership. See you tomorrow. I wonder what can be so bad that it makes you

want to die. Check this out dot dot dot he he he. You need to lose weight. That last one

is particularly straightforward. As far as social engineering goes some of the email subjects

Fizzer used were pretty awful but others they were actually pretty catchy and I can see how people

would have been tempted to click them. Similar to the sender name the body was also picked from a

predefined list the worm had. Some examples are watching the game having a bud. There is only one

good knowledge and one evil ignorance.

you don't have to if you don't want to. So now that your infected machine has sent the worm to

all your friends, family, and co-workers, let's talk about what happens next. First off, that

keylogger I mentioned earlier is now actively monitoring everything you type. Fizzer also

creates a backdoor for AOL Instant Messenger, also known as AIM. The worm connects to an AIM

server with a random username creating a bot. The person controlling the worm could then establish

a connection to that bot and start controlling your machine remotely by sending commands through

the chat. And just in case the AIM backdoor wasn't working, Fizzer had a backup plan. It also created

an IRC backdoor. IRC, which stands for Internet Relay Chat, is kind of like AIM in that it lets

people chat. But IRC is decentralized and has actually been around a lot longer,

about a decade before AIM even existed. And while AIM is long gone,

IRC is still around. And as if that wasn't enough, Fizzer also listened on four additional ports.

Port 2018, the command port, was used for sending and receiving commands. 2019, file port, was used

for sending and receiving files. 2020, console port, allowed remote control of the system.

And port 2021, video port, was used for capturing video and sending it out.

And to top it all off, Fizzer could even start an HTTP web server on port 81,

giving the attacker even more access to your infected computer.

Now I know we're talking about a worm, something malicious that caused damage and infected users,

but you've got to admit, that's a pretty robust piece of software. I've worked at quite a few

tech companies over the years, and let me tell you, a lot of modern day applications don't even

come close to that level of redundancy.

Thank you.

At this point, Fizzer has sunk its claws deep into your system.

You are at its mercy.

And while it's in there, it kills off a list of processes associated with antivirus programs.

So that fancy software you bought and paid for?

Yeah, completely useless now.

But Fizzer didn't just stop at disabling your antivirus.

Parts of the Worms code were actually encrypted,

which made it even harder for antivirus programs to detect it in the first place.

It was like trying to find a needle in a haystack.

Except the needle was hiding behind a locking key.

But now that I think about it,

a needle in a haystack with a lock would actually be a lot easier to find.

So maybe this isn't the best analogy.

So instead, it would be like trying to find half a needle in a haystack.

So now the Worm is fully in.

It's installed.

It's persistent.

It's always running.

The malicious actor has guaranteed access.

Your antivirus is down for the count.

And if there's any issues with the Worm itself, no worries.

It can auto-

update in the background to make sure it's always running the latest version. Remember how I

mentioned earlier that these updates were downloaded from a GeoCities website? For those who don't

recall, GeoCities was one of those old school web hosting services back in the day. It was like the

MySpace of websites, everyone had one. So the malicious actor would just upload the update to

a GeoCities webpage, and all the infected machines would check in and grab the latest version.

Now despite all this, the actual damage caused by Fizzer was never fully quantified in terms of

dollars. While the worm had the ability to launch DDoS attacks, I couldn't find any references to

any actual documented attacks. It seems the main damage was financial, with people's credentials

and personal information being easily stolen. Fizzer was definitely in a league of its own,

and the methods it used for persistence are still widely used in malware today.

And although the creator of Fizzer is still a mystery, there were

definitely efforts to track them down. Law enforcement agencies and cybersecurity companies

were racing to figure out who was behind it. But it was a different time, and tracking down

malware authors wasn't nearly as advanced as it is today. Though, even now, many still remain a

mystery. The moral of the story? Always check the extension of those music files you download.

Make sure it's mp3 and not exe.

In the Shell is written, researched, and recorded by me, the Sniffer of Packets. If you made it this

far, you either couldn't find the pause button, or you enjoyed the episode. If it's the latter,

then I have a small request. Please click the share button wherever you're listening,

and send this episode to someone you think would enjoy it. I would truly appreciate it.

That's it. Take care, and I'll see you next time.