Win32/Rustock Hide and Seek – MSRT Telemetry

In his 10/18 blog post, Oleg provided great insights about the distribution, installation and payload of Win32/Rustock which was added to MSRT 10/14 release. As of 10/29 MSRT has removed this rootkit from 99,418 distinct machines. Breakdown of these removals by regions is shown as below. Country/Region distinct machined cleaned United States 41,305 France 6,295 Spain…

0

Get Protected, Now!

Microsoft released a security update today that fixes a vulnerability that affects all supported versions of Windows. On some versions of Windows, an unauthenticated attacker can remotely execute code on a vulnerable computer. Basically if file sharing is enabled and the security update is not installed yet, the computer is vulnerable. File sharing is enabled…

0

Trojan Writers Drive BMW

Why is malware that targets online games so prevalent these days? Why is there an interesting saying in China: “Trojan writers drive BMW” (“写木马, 开宝马”)?  The writers and distributors of trojans that steal passwords and account details from popular online games have been making huge profits. Why and how can they make huge profits from…

0

Uprooting Win32/Rustock

This month we added a family of rootkit-enabled trojans to MSRT – Win32/Rustock Win32/Rustock is a multi-component family of rootkit-enabled backdoor trojans, which were historically developed to aid in the distribution of ‘spam’ e-mail. First discovered sometime in early 2006, Rustock has evolved to become a prevalent and pervasive threat. Recently we’ve seen it associated with the…

0

SQL Injection – New Approach for Win32/FakeXPA?

(often known as “Antivirus 2009”). One night while browsing, a message box popped up asking me to do a “security scan”. As a researcher, I wouldn’t let this pass me by. After going through my opened tabs I narrowed down the culprit to a forum I had open at the time. “View Source” showed a…

0

Email Scam Targets Microsoft Customers

Email scams are a common way to spread malware and/or steal personal information. Some great guidelines to help you protect yourself from such scams are outlined here: http://www.microsoft.com/protect/computer/viruses/email.mspx  We have recently found out about the latest in an ongoing string of email scams that target Microsoft customers. This particular scam contains the Backdoor:Win32/Haxdoor trojan as…

1

Malware Writer Wants an Eye-to-Eye With Us

Zlob has been around for quite some time now and it is still evolving rapidly. If we thought of Zlob as a car, it has gone through the equivalent of several overhaulings… Zlob constantly changes its decryption, obfuscation, and structure. As is our everyday routine, we were looking at several new variants of Zlob this morning…

1

The Cost of Free $oftware (part 2)

After we tracked down one of the sources for the Zlob trojan as a free torrent download, we decided to see exactly how deep the rabbit-hole goes. So we checked the newest uploads and saw another package for the latest version of WinRAR (3.80).  It had just been uploaded so we decided to see if…

0

The Cost of Free $oftware

Today we stumbled upon an interesting file. The file in question, “wrar380CorporateEdition.exe” (md5: f054f5a1bcb79098916c80b28e4f2bec), appears to be the install kit for the WinRar archiver. Upon closer inspection, it is actually a self-extract cab installer containing 2 files: “wrar380.Regged.exe”“Setup_ver1.1808.0.exe” When the installer is run, both files execute. While the file “wrar380.Regged.exe” is actually WinRAR, the other…

1

What’s Travelling on the Wire (part 2)

Quite a while has passed since we started logging data about incoming attacks on an Internet-connected system and now we have gathered enough information to show the risks of exposing an unsecured computer on the Web. Let’s start with some data about the attacks, first where they originate from and later, what they are trying…

0