Fake apps: Behind the effective social strategy of fraudulent paid-archives

In my previous blog “Fake apps and the lure of alternative sources,” I discussed a fraudulent scheme that takes advantage of known, legitimate and free applications. Unlike rogues and ransomware which use threats and force to influence their victims, the social engineering techniques employed by a fake installer are less aggressive yet, interestingly, more deceptive….

0

Update signature definitions to resolve performance issues in definitions starting with 1.141.2400.0

Some users of Microsoft antimalware products have reported a performance issue with signature definition versions starting with 1.141.2400.0 (12/21/2012 1920 UTC). The current definition files, since 1.141.2639.0 (12/27/2012 0625 UTC), resolve this issue. If you have a signature set in the affected range, please update to the current definition files. Shannon SabensMMPC

0

Korean gaming malware – served 3 ways

Recently, we’ve seen similar activities being performed by different malware that monitor online Korean applications. Mostly, the applications they monitor are card games, such as those in Figure 1. Figure 1: Examples of online Korean games that are being monitored. (Source: http://www.hangame.com)   The following applications are monitored if found running on the system: LASPOKER.EXE…

0

MSRT December ’12 – Phdet

Phdet is the family which has been added to the December 2012 release of the Malicious Software Removal Tool. Phdet is a family of backdoor trojans that have the ability to perform distributed denial of service (DDoS) attacks. The bot can be found online, going by the formal name of “Black Energy”.  The DDoS bot has…

0

Unexpected reboot: Necurs

Necurs is a prevalent threat in the wild at the moment – variants of Necurs were reported on 83,427 unique machines during the month of November 2012. Necurs is mostly distributed by drive-by download. This means that you might be silently infected by Necurs when you visit websites that have been compromised by exploit kits such as Blackhole. So…

0

The "hidden" backdoor – VirTool:WinNT/Exforel.A

Recently we discovered an advanced backdoor sample – VirTool:WinNT/Exforel.A. Unlike traditional backdoor samples, this backdoor is implemented at the NDIS (Network Driver Interface Specification) level. VirTool:WinNT/Exforel.A implements a simple private TCP/IP stack and hooks NDIS_OPEN_BLOCK for the TCP/IP protocol, as shown in Figure 1.    Figure 1: Hooked functions in NDIS_OPEN_BLOCK   This means that backdoor-related TCP traffic will be diverted to the…

0

MSRT November ’12 – Weelsof around the world

Win32/Weelsof is part of a large malware family called ransomware, which is different from your traditional trojans and worms. Ransomware’s main goal is to financially benefit from every infected user and force them to pay. We included Win32/Weelsof in our November release of the Malicious Software Removal Tool. Malware entry point The user can be…

0