Jump to content

Could you shed some light onto this subject?


Kurz

Recommended Posts

Note I found this post in a thread at AnimeSuki. http://forums.animesuki.com/showthread.php?t=43280

I hope I could hear some sort of response on the subject.

For all those out there using uTorrent...

I just caught uTorrent making cloaked emails to:

PROCESS NAME: utorrent.exe

URL: 10001264536.0000028728.acesso.oni.pt:110

DIRECT IP: 213.58.83.225

REMOTE PORT: POP3

PROTOCOL: TCP

As long as AVG was monitoring the email traffic directly, it would close the port immediately upon connection and not send anything outward.

However, once AVG was not monitoring the traffic anymore, the connection was made immediately and a packet of data was dropped off at that server, and a payload was delivered to my machine and written somewhere.

Unlike many other Bittorent clients out there, uTorrent does not open it's source code to anyone. So, anything can be hidden in there. Has anyone found their systems compromised after using uTorrent? Can anyone verify what uTorrent sends and received via this email?

This is NOT the "update" process! That does a different connection elsewhere.

Another thing I have noticed as well. Once you CLOSE uTorrent, it takes about 2 minutes before it "closes" and the application does not register as uTorrent anymore - HOWEVER - it is still running in the background, but now without a name. It is seeding off files from your machine to Bittorrent networks around the world.

The only way to completely close uTorrent is to shut down your machine and re-start it. Dont use uTorrent.

Link to comment
Share on other sites

Another thing I have noticed as well. Once you CLOSE uTorrent, it takes about 2 minutes before it "closes" and the application does not register as uTorrent anymore - HOWEVER - it is still running in the background, but now without a name. It is seeding off files from your machine to Bittorrent networks around the world.

This is the only thing worth comenting, it still amazes me the reaction that false positives create on ignorant people.

It has happened in the past that uT would not close properly and remain in the background. With Task Manager, you could easily shut it down without any ill effects. If the OP can consistently reproduce this behaviour he should report it as a bug.

Link to comment
Share on other sites

It doesn't take 2 minutes to close, it takes UP TO 15-30 seconds, usually far less (depends on tracker status I guess)

I'd post there but I can't be arsed to register :P

I love firewalls, they give so many false positives, and their users tend to not be very smart...

Link to comment
Share on other sites

Thanks for the inquery. Sorry about this being discused earlier I was searching on the forums though I guess I didnt use the right parameters.

I thought it was a false positive so I though why not make a thread in utorrent forums to link too if i get a response for you guys.

Link to comment
Share on other sites

Nope, definitely not the peer's fault...

After doing some more research:

(1) It is definitely uTorrnet sending the emails - nothing else

(2) uTorrent automatically begins to make several hundred connections upon startup now that that one email has sucesfully worked - and I have no torrents in my list to work on - it just starts sending stuff from computer to hundreds of computers all over the place.

(3) The email traffic is definitely outgoing email from my computer to elsewhere.

(4) I have no idea what the contents of the email actually is yet

In the meantime, I've turned uTorrent over to a security research group. It may take a few days, but I will have some official information about it sometime soon. I have stopped using uTorrent for obvious reasons. It's too bad that a potentially great program has to be marred by stuff like this.

Apart from the fact that I'm lol'ing at that last statement (silly firewall users), he's wrong on every damn point, and the security research group is gonna laugh him out of the country as well.

This isn't the first time we've had AVG users' e-mail protection go insane like this, or hell, any other firewall (none of them actually examine the packet, they just do port-based filtering)

1) No e-mails are being sent, you're just connecting to peers who use a remote port of 25 (the SMTP port). It's regular BitTorrent data. If you honestly are that paranoid, install Ethereal, Winpcap, and capture packets that are using port 25, simple as that... Then you can easily examine the contents (and see that it's just regular BT data)

2) The 'hundreds' of connections are UDP packets being sent out for DHT. Since UDP is connection-less, the firewall probably registers every single packet as a connection.

3) Read #1

4) Read #1

This is why I don't like the technically less inclined to have firewalls, especially not 'dumb' (ones that don't analyze packets) firewalls that pop up silly alerts like this. But there's not much we can do about it...

I'd post this there myself but I can't be arsed to register.

Link to comment
Share on other sites

Whaha, this is just too much :D Seriously, it's pretty bold making these kinds of accusations if you can't even analyse one packet :P

Firon, you're right on the money with using etheral, in fact... I'm doing my first lab session next week with that application :D

Link to comment
Share on other sites

Hmm... I am amazed at all this. Seeing that Ludde is clever enough to make uTorrent as good as it is, I am quite sure that, if he so wished, he's clever enough to enable spyware in a far more subtle and less detectable way than sending out damn emails... especially knowing how paranoid the BT community is.

I am in no way inferring that uT does actually contain spyware :)

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...