Russian hackers using HTTP proxy requests to attack other sites
You really should disable support for proxying in your web server unless you
a) know why you need it enabled, and
b) have carefully configured your proxy not to allow arbitrary requests.
A new attack I started seeing two days ago illustrates why. Below are the URIs of the first and most recent attack of this sort I’ve seen. I’ve modified the Login
values to obscure the accounts being attacked. The malware is attempting to use my server to mask the real source of the attack to verify account credentials. If you care about the Internet you shouldn’t make it easy for hackers to exploit your server to conduct attacks.
GET http://auth.mail.ru/cgi-bin/auth?Login=abcdef@mail.ru&Password=lovelyyou&mobile=1&simple=0&useragent=android HTTP/1.1
and
GET http://auth.mail.ru/cgi-bin/auth?Login=abcdef@mail.ru&Password=v37rICJ199&mobile=1&simple=0&useragent=android HTTP/1.1
The HTTP user-agent values were “mobmail android 2.1.7” and “mobmail android 2.2.9” respectively.
Even though I have proxying disabled for my Apache web server I also have the following in my .htaccess
file to make it clear why I’m rejecting the request.
RewriteCond %{THE_REQUEST} ^\w+\s+HTTPS?:// [NC] RewriteRule ^ /blocked.php [END,E=error-notes:proxy-probe]
Note that /blocked.php
sets the HTTP status to 400 and the error-notes
environment value is included in my log message via %{error-notes}e
in the LogFormat
string.