Worm:Win32/Prolaco.Gen!C

Total Page:16

File Type:pdf, Size:1020Kb

Worm:Win32/Prolaco.Gen!C Worm:Win32/Prolaco.gen!C http://www.securityhome.eu/malware/malware.php?mal_id=101659340549db6cc479b3e0.45108438 Worm:Win32/Prolaco.gen!C Article URL malware.php?mal_id=101659340549db6cc479b3e0.45108438 Author SecurityHome.eu Published: 07 April 2009 Aliases : Worm:Win32/Prolaco.gen!C is also known as Also Known As:Trojan.Win32.Buzus.apot (Kaspersky), W32/Buzus.LGC (Norman), W32/Autorun-ABH (Sophos), Win32/Merond.G (ESET), Win32/Fruspam.S (CA), IRC/Flood.dr (McAfee), W32.Ackantta.B@mm (Symantec) . Explanation : Worm:Win32/Prolaco.gen!C is a worm that spreads via e-mail, removable drives and Peer-to-Peer file sharing networks. This worm also lowers security settings and installs Win32/Vundo.Win32/Vundo is a multiple-component family of programs that deliver 'out of context' pop-up advertisements. They may also download and execute arbitrary files. Symptoms System ChangesThe following system changes may indicate the presence of this malware: * The presence of the following files: <system folder>jucshed.exe <system folder>javase11.exe <system folder><random>.dll * The presence of the following registry modifications: Adds value: "Sun Java Updater v7.11" With data: "<system folder>jucshed.exe" To subkey: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun Sets value: "<system folder>jucshed.exe" With data: "<system folder>jucshed.exe:*:enabled:explorer" To subkey: Page 1/6 Worm:Win32/Prolaco.gen!C http://www.securityhome.eu/malware/malware.php?mal_id=101659340549db6cc479b3e0.45108438 HKLMSYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorized ApplicationsList Worm:Win32/Prolaco.gen!C is a worm that spreads via e-mail, removable drives and Peer-to-Peer file sharing networks. This worm also lowers security settings and installs Win32/Vundo.Win32/Vundo is a multiple-component family of programs that deliver 'out of context' pop-up advertisements. They may also download and execute arbitrary files. Installation Worm:Win32/Prolaco.gen!C creates the following files upon execution: * <system folder>jucshed.exe --> a copy of the worm * <system folder>javase11.exe --> detected as Trojan:Win32/Vundo.KO * <system folder><random>.dll --> detected as Trojan:Win32/Vundo.gen!AJ It modifies the registry to execute its copy at each Windows start: Adds value: "Sun Java Updater v7.11" With data: "<system folder>jucshed.exe" To subkey: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:WinntSystem32; and for XP and Vista is C:WindowsSystem32.Spreads Via… E-mail Win32/Prolaco.gen!C gathers e-mail addresses to send itself to from files on the affected machine with the following extensions: .doc .htm .pdf .chm .txt The worm avoids collecting e-mail addresses with the following strings:abuse accoun acd-group acdnet.com acdsystems.com acketst admin ahnlab alcatel-lucent.com anyone apache arin. avira berkeley bitdefender bluewin.ch borlan bpsoft.com buyrar.com Page 2/6 Worm:Win32/Prolaco.gen!C http://www.securityhome.eu/malware/malware.php?mal_id=101659340549db6cc479b3e0.45108438 certific cisco clamav contact debian drweb eset.com example f-secure feste firefox ghisler.com gold-certs honeynet honeypot ibm.com icrosof icrosoft idefense ikarus inpris isc.o isi.e jgsoft kaspersky kernel lavasoft linux listserv mcafee messagelabs mit.e mozilla mydomai nobody nodomai noone nothing novirusthanks ntivi nullsoft.org panda postmaster prevx privacy qualys quebecor.com rating redhat rfc-ed ruslis samba samples secur security sendmail service slashdot somebody someone Page 3/6 Worm:Win32/Prolaco.gen!C http://www.securityhome.eu/malware/malware.php?mal_id=101659340549db6cc479b3e0.45108438 sopho sourceforge ssh.com submit sun.com support syman sysinternals tanford.e the.bat usenet utgers.ed virus virusbuster webmaster winamp wireshark www.ca.com The worm then performs mail exchanger (MX) queries of the domain names in the gathered e-mail addresses to guess the correct associated mail server. Win32/Prolaco.gen!C uses the following strings as a prefix to guess the mx record: mx.%s mail.%s smtp.%s mx1.%s mxs.%s mail1.%s relay.%s ns.%s gate.%s E-mail messages are generated by the worm and sent to the collected e-mail addresses. Messages may be in the following or similar format: From: [email protected] Subject: You have received A Hallmark E-Card! Attachment postcard.exe (Note: The Message body is in HTML format. The background content - images, references, and so on - are rendered from the official Hallmark website.) P2P File Sharing NetworksWin32/Prolaco.gen!C copies itself to the following shared folders of popular peer-to-peer file sharing applications: %ProgramFiles%icqshared folder %ProgramFiles%grokstermy grokster %ProgramFiles%emuleincoming %ProgramFiles%morpheusmy shared folder %ProgramFiles%limewireshared %ProgramFiles%eslafiles %ProgramFiles%winmxshared C:Downloads The worm may create copies of itself in these folders with the following enticing filenames: Absolute Video Converter 6.2.exe Ad-aware 2009.exe Adobe Acrobat Reader keygen.exe Adobe Photoshop CS4 crack.exe Alcohol 120 v1.9.7.exe AnyDVD HD v.6.3.1.8 Beta incl crack.exe Avast 4.8 Professional.exe AVS video converter6.exe BitDefender AntiVirus 2009 Keygen.exe CheckPoint ZoneAlarm And AntiSpy.exe Page 4/6 Worm:Win32/Prolaco.gen!C http://www.securityhome.eu/malware/malware.php?mal_id=101659340549db6cc479b3e0.45108438 CleanMyPC Registry Cleaner v6.02.exe Daemon Tools Pro 4.11.exe Divx Pro 6.8.0.19 + keymaker.exe Download Accelerator Plus v8.7.5.exe Download Boost 2.0.exe DVD Tools Nero 9 2 6 0.exe G-Force Platinum v3.7.5.exe Google Earth Pro 4.2. with Maps and crack.exe Grand Theft Auto IV (Offline Activation).exe Internet Download Manager V5.exe K-Lite codec pack 3.10 full.exe K-Lite codec pack 4.0 gold.exe Kaspersky Internet Security 2009 keygen.exe LimeWire Pro v4.18.3.exe Magic Video Converter 8 0 2 18.exe Microsoft Office 2007 Home and Student keygen.exe Microsoft Visual Studio 2008 KeyGen.exe Microsoft.Windows 7 Beta1 Build 7000 x86.exe Motorola, nokia, ericsson mobil phone tools.exe Myspace theme collection.exe Nero 9 9.2.6.0 keygen.exe Norton Anti-Virus 2009 Enterprise Crack.exe Opera 9.62 International.exe PDF password remover (works with all acrobat reader).exe Perfect keylogger family edition with crack.exe Power ISO v4.2 + keygen axxo.exe Smart Draw 2008 keygen.exe Sony Vegas Pro 8 0b Build 219.exe Sophos antivirus updater bypass.exe Super Utilities Pro 2009 11.0.exe Total Commander7 license+keygen.exe Tuneup Ultilities 2008.exe Ultimate ring tones package1 (Beethoven,Bach, Baris Manco,Lambada,Chopin, Greensleves).exe Ultimate ring tones package2 (Lil Wayne - Way Of Life,Khia - My Neck My Back Like My Pussy And My Crack,Mario - Let Me Love You,R. Kelly - The Worlds Greatest).exe Ultimate ring tones package3 (Crazy In Love, U Got It Bad, 50 Cent - P.I.M.P, Jennifer Lopez Feat. Ll Cool J - All I Have, 50 Cent - 21 Question).exe VmWare keygen.exe Winamp.Pro.v6.53.PowerPack.Portable+installer.exe Windows 2008 Enterprise Server VMWare Virtual Machine.exe Windows XP PRO Corp SP3 valid-key generator.exe Windows2008 keygen and activator.exe WinRAR v3.x keygen RaZoR.exe Youtube Music Downloader 1.0.exe Removable Drives Win32/Prolaco.gen!C copies itself to the following location on removable drives: <drive:>RECYCLERS-1-6-21-2434476521-1645641927-702000330-1542 edmond.exe It then creates '<drive:>Desktop.ini' so that the icon for removable drives appears as a folder icon when viewed in Windows Explorer. The worm creates '<drive:>Autorun.inf' which launches the worm copy when the removable drive is attached to a computer that has Autoplay enabled. In addition, the icon for the worm appears as a "closed folder" or file folder when viewed in Windows Explorer. Web Servers If the worm infects a computer that is running IIS, it attempts to replace the legitimate Web root or Index file stored in the folder '%root%inetpubwwwrootindex.htm' with a page containing the following message: Security warning! Your browser affected by the DirectAnimation Path ActiveX vulnerability. Please install the following Page 5/6 Worm:Win32/Prolaco.gen!C http://www.securityhome.eu/malware/malware.php?mal_id=101659340549db6cc479b3e0.45108438 MS09-067 hotfix in order to be able to watch this website. 'MS09-067' is a hyperlink to a dropped copy of the worm, for example: '%root%inetpubwwwrootms09-067.exe'. Payload Lowers Security Settings Win32/Prolacto.gen!C makes the following changes to an infected system which results in lowered security settings: * Adds worm as an authorized application in the Windows firewall policy by modifying the registry: Sets value: "<system folder>jucshed.exe" With data: "<system folder>jucshed.exe:*:enabled:explorer" To subkey: HKLMSYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorized ApplicationsList * Disbales update notifications and the auto-update feature for Windows: HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity Center UpdatesDisableNotify dword:00000001 HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServiceswuauserv Start = dword:00000004 Deletes Files Worm:Win32/Prolaco.gen!C searches for the installation directory of the file Mcshield.exe by looking at the following registry entry: HKEY_LOCAL_MACHINESOFTWAREMcAfeeAVEngineszInstallDir If found, it deletes this file. This file may be related to McAfee security software.Additional InformationWin32/Prolaco.gen!C connects to the Web site 'whatismyip.com' to retrieve the IP address of the infected machine. The worm may also query the following web sites to obtain further information: gin.ntt.net whois.ripe.net whois.afrinic.net whois.v6nic.net whois.nic.or.kr whois.apnic.net whois.nic.ad.jp whois.arin.net whois.lacnic.net whois.nic.br whois.twnic.net rwhois.gin.ntt.net Analysis by Elda Dimakiling Last update 07 April 2009 Page 6/6.
Recommended publications
  • Symantec Report on Rogue Security Software July 08 – June 09
    REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software July 08 – June 09 Contents Introduction . 1 Overview of Rogue Security Software. 2 Risks . 4 Advertising methods . 7 Installation techniques . 9 Legal actions and noteworthy scam convictions . 14 Prevalence of Rogue Security Software . 17 Top reported rogue security software. 17 Additional noteworthy rogue security software samples . 25 Top rogue security software by region . 28 Top rogue security software installation methods . 29 Top rogue security software advertising methods . 30 Analysis of Rogue Security Software Distribution . 32 Analysis of Rogue Security Software Servers . 36 Appendix A: Protection and Mitigation. 45 Appendix B: Methodologies. 48 Credits . 50 Symantec Report on Rogue Security Software July 08 – June 09 Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. This includes an overview of how these programs work and how they affect users, including their risk implications, various distribution methods, and innovative attack vectors. It includes a brief discussion of some of the more noteworthy scams, as well as an analysis of the prevalence of rogue security software globally. It also includes a discussion on a number of servers that Symantec observed hosting these misleading applications. Except where otherwise noted, the period of observation for this report was from July 1, 2008, to June 30, 2009. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network.
    [Show full text]
  • Rootkit- Rootkits.For.Dummies 2007.Pdf
    01_917106 ffirs.qxp 12/21/06 12:04 AM Page i Rootkits FOR DUMmIES‰ 01_917106 ffirs.qxp 12/21/06 12:04 AM Page ii 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iii Rootkits FOR DUMmIES‰ by Larry Stevenson and Nancy Altholz 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iv Rootkits For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission.
    [Show full text]
  • PC Anti-Virus Protection 2011
    PC Anti-Virus Protection 2011 12 POPULAR ANTI-VIRUS PROGRAMS COMPARED FOR EFFECTIVENESS Dennis Technology Labs, 03/08/2010 www.DennisTechnologyLabs.com This test aims to compare the effectiveness of the most recent releases of popular anti-virus software1. The products include those from Kaspersky, McAfee, Microsoft, Norton (Symantec) and Trend Micro, as well as free versions from Avast, AVG and Avira. Other products include those from BitDefender, ESET, G-Data and K7. The tests were conducted between 07/07/2010 and 22/07/2010 using the most up to date versions of the software available. A total of 12 products were exposed to genuine internet threats that real customers could have encountered during the test period. Crucially, this exposure was carried out in a realistic way, reflecting a customer’s experience as closely as possible. For example, each test system visited real, infected websites that significant numbers of internet users were encountering at the time of the test. These results reflect what would have happened if those users were using one of the seven products tested. EXECUTIVE SUMMARY Q Products that block attacks early tended to protect the system more fully The nature of web-based attacks means that the longer malware has access to a system, the more chances it has of downloading and installing further threats. Products that blocked the malicious and infected websites from the start reduced the risk of compromise by secondary and further downloads. Q 100 per cent protection is rare This test recorded an average protection rate of 87.5 per cent. New threats appear online frequently and it is inevitable that there will be times when specific security products are unable to protect from some of these threats.
    [Show full text]
  • The Most Common Blunder People Make When the Topic of a Computer Virus Arises Is to Refer to a Worm Or Trojan Horse As a Virus
    Trojan And Email Forging 1) Introduction To Trojan&viruses: A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.[1][2][3][4][5] A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files (computer virus) or otherwise propagate themselves (worm).[7] A computer may host a Trojan via a malicious program a user is duped into executing (often an e-mail attachment disguised to be unsuspicious, e.g., a routine form to be filled in) or by drive-by download. The Difference Between a Computer Virus, Worm and Trojan Horse The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus.
    [Show full text]
  • Diapositiva 1
    Feliciano Intini Responsabile dei programmi di Sicurezza e Privacy di Microsoft Italia • NonSoloSecurity Blog: http://blogs.technet.com/feliciano_intini • Twitter: http://twitter.com/felicianointini 1. Introduction - Microsoft Security Intelligence Report (SIR) 2. Today‘s Threats - SIR v.8 New Findings – Italy view 3. Advancements in Software Protection and Development 4. What the Users and Industry Can Do The 8th volume of the Security Intelligence Report contains data and intelligence from the past several years, but focuses on the second half of 2009 (2H09) Full document covers Malicious Software & Potentially Unwanted Software Email, Spam & Phishing Threats Focus sections on: Malware and signed code Threat combinations Malicious Web sites Software Vulnerability Exploits Browser-based exploits Office document exploits Drive-by download attacks Security and privacy breaches Software Vulnerability Disclosures Microsoft Security Bulletins Exploitability Index Usage trends for Windows Update and Microsoft Update Microsoft Malware Protection Center (MMPC) Microsoft Security Response Center (MSRC) Microsoft Security Engineering Center (MSEC) Guidance, advice and strategies Detailed strategies, mitigations and countermeasures Fully revised and updated Guidance on protecting networks, systems and people Microsoft IT ‗real world‘ experience How Microsoft IT secures Microsoft Malware patterns around the world with deep-dive content on 26 countries and regions Data sources Malicious Software and Potentially Unwanted Software MSRT has a user base
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    AUGUST 2010 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT EXPLOIT KITS UNDER SCRUTINY Apple pie order? Mark Davis documents how to create LAMP and WAMP servers and how to approach the study of 3 NEWS exploit kits in a local lab. page 8 VB2010 call for last-minute papers VB seminar DETECTING PHISHING All change Marius Tibeica describes an automated method of detecting phishing at the browser level based on the 3 VIRUS PREVALENCE TABLE tag structure of the HTML. page 11 4 TECHNICAL FEATURE VB100 CERTIFICATION ON Anti-unpacker tricks – part eleven WINDOWS VISTA With another epic haul of 54 8 TUTORIAL products to test this month, the VB Advanced exploit framework lab set-up test team could have done without Aug 2010 the bad behaviour of a number FEATURES of products: terrible product 11 HTML structure-based proactive phishing design, lack of accountability for detection activities, blatant false alarms in major software, numerous 15 What’s the deal with sender authentication? Part 3 problems detecting the WildList set, and some horrendous instability under pressure. Happily, there were also some good performances 21 COMPARATIVE REVIEW to balance things out. John Hawes has the details. Windows Vista Business Edition Service page 21 Pack 2 60 END NOTES & NEWS ISSN 1749-7027 COMMENT ‘Over 40% [of I’d contend that while ‘somewhat vulnerable’ might be about right for systems/application vulnerabilities computer users] and exposure to current malware, the fi gures would be think [that Macs are] more alarming if the survey were more focused on the vulnerability of users rather than systems.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 12 July through December, 2011 www.microsoft.com/sir Microsoft Security Intelligence Report This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2012 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. JULY–DECEMBER 2011 i Authors Dennis Batchelder David Felstead Ken Malcolmson Tim Rains Microsoft Protection Bing Microsoft Trustworthy Microsoft Trustworthy Technologies Computing Computing Paul Henry Shah Bawany Wadeware LLC Nam Ng Frank Simorjay Microsoft Windows Safety Microsoft Trustworthy Microsoft Trustworthy Platform Nitin Kumar Goel Computing Computing Microsoft Security Joe Blackbird Response Center Mark Oram Holly Stewart Microsoft Malware Microsoft Trustworthy Microsoft Malware Protection Center Jeff Jones Computing Protection Center Microsoft Trustworthy Eve Blakemore Computing Daryl Pecelj Matt Thomlinson Microsoft Trustworthy Microsoft IT Information Microsoft Trustworthy Computing Jimmy Kuo Security and Risk Computing Microsoft Malware Management Joe Faulhaber Protection Center Scott Wu Microsoft Malware Dave Probert Microsoft Malware Protection Center Marc Lauricella Microsoft
    [Show full text]
  • Implementing Rootkits to Identify Vulnerabilities
    Implementing Rootkits to Address Operating System Vulnerabilities Manuel Corregedor and Sebastiaan Von Solms Academy of Computer Science and Software Engineering, University of Johannesburg Johannesburg, South Africa {mrcorregedor, basievs}@uj.ac.za Abstract—Statistics show that although malware detection A rootkit is a malicious program or set of programs that techniques are detecting and preventing malware, they do not tries to hide its existence on an infected computer by attacking guarantee a 100% detection and / or prevention of malware. the Operating System (OS) by using one or a combination of This is especially the case when it comes to rootkits that can the following: modifying program binaries, hooking call tables manipulate the operating system such that it can distribute other such as the System Service Descriptor Table (SSDT) and the malware, hide existing malware, steal information, hide itself, Interrupt Descriptor Table (IDT) to hijack the kernel's control disable anti-malware software etc all without the knowledge of flow, modifying legitimate code to force a call to rootkit code the user. This paper will demonstrate the steps required in order or by using DKOM (Direct Kernel Object Manipulation) [9] to create two rootkits. We will demonstrate that by [10][11][12][13]. Rootkits are designed to fundamentally implementing rootkits or any other type of malware a researcher subvert the OS kernel and are capable of obtaining and will be able to better understand the techniques and maintaining unrestricted control and access within the vulnerabilities used by an attacker. Such information could then compromised system without even being detected by anti- be useful when implementing anti-malware techniques.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 Norway This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 2 NORWAY Norway The statistics presented here are generated by Microsoft security programs and services running on computers in Norway in 4Q15 and previous quarters. This data is provided from administrators or users who choose to opt in to provide data to Microsoft, using IP address geolocation to determine country or region. On computers running real-time security software, most attempts by malware to infect computers are blocked before they succeed. Therefore, for a comprehensive understanding of the malware landscape, it’s important to consider infection attempts that are blocked as well as infections that are removed. For this reason, Microsoft uses two different metrics to measure malware prevalence: Encounter rate is simply the percentage of computers running Microsoft real-time security products that report a malware encounter, whether the infection attempt succeds or not. Computers cleaned per mille, or CCM, is an infection rate metric that is defined as the number of computers cleaned for every 1,000 unique computers executing the Malicious Software Removal Tool (MSRT), a free tool distributed through Microsoft update services that removes more than 200 highly prevalent or serious threats from computers.
    [Show full text]
  • Information Security Primer from Social Engineering to SQL Injection...And Everything Beginning with P
    Information Security Primer From Social Engineering to SQL Injection...and Everything Beginning with P PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF&nbsp;generated&nbsp;at:&nbsp;Tue, 18 Aug 2009 21:14:59 UTC Contents Articles It Begins with S 1 Social engineering (security) 1 Spyware 7 SQL injection 26 Bonus Material 34 Password cracking 34 References Article Sources and Contributors 41 Image Sources, Licenses and Contributors 43 Article Licenses License 44 1 It Begins with S Social engineering (security) Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. Social engineering techniques and terms All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases.[1] These biases, sometimes called "bugs in the human hardware," are exploited in various combinations to create attack techniques, some of which are listed here: Pretexting Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action and is typically done over the telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g. for impersonation: date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target.
    [Show full text]
  • New Developments in Trojan Virus Engineering Author: Mengze Li ▪ Advisor: Sonja Streuber
    The Wars in Your Machine: New Developments in Trojan Virus Engineering Author: Mengze Li ▪ Advisor: Sonja StreuBer INTRODUCTION THREE NEW TROJANS Definition: Shedun: Android Trojan Cockroach Trojan Polymorphic JavaScript Trojan The Trojan Virus is a malicious computer program that is used to • Runs on Android mobile devices; has been seen pre- • Steals the sensitive data, such as user name, • Spread as email attachments compromise a computer by fooling users about its real intent. installed on cellphones and tablets from China. password, time, date, email, and every key stroke • In different emails, the cipher, string literals • Downloads and installs adware; launches popup and emails the data back to the host. and variable names are different which • Unlike computer viruses, or worms, the Trojan does not directly advertisements • Spread among Windows PCs through USB drives. makes itself less detectable. attack operating systems • Roughly 20,000 popular Android applications • Very hard to detect with anti-virus software. • Meant to be run from disk, which gives it • Modern forms act as a backdoor to grant access without infected (Twitter, Facebook, Snapchat, etc.) permissions to attack system globally. authorization. Analysis • Help attackers to break the confidentiality, integrity and Analysis Analysis availability of data • Can cause a huge impact to both, private users and public organizations, such as exposing the user’s credit card information, or other personal identity information (PII). Method: • Variable names and string literals encoded. • In this study, we are reviewing and analyzing the actual code of three famous modern Trojans in order to learn their most • Transmit target email with Transmit.exe file.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    APRIL 2010 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT A FUTILE BATTLE? Are takedowns an exercise in futility? Mary Landesman evaluates recent botnet takedown efforts. 3 NEWS page 2 VB2010 programme announced CYBER WARFARE All star superstars Terry Zink looks at the increasingly common Dangerous places to be online phenomenon of hacktivism and details three recent cyber warfare attacks. 3 VIRUS PREVALENCE TABLE page 11 FEATURES EXPLOIT KIT EXPLOSION 4 Evasions in Intrusion Prevention/ In the fi rst of a two-part series introducing exploit Detection Systems kits Mark Davis outlines the basic details of the dime-a-dozen kits used in drive-by browser-based 11 Botnets, politics and hacktivism – an interesting partnership attacks. page 21 15 ‘Signatures are dead.’ ‘Really? And what about pattern matching?’ RECORD VB100 ON XP In VB’s largest ever VB100 21 TUTORIAL comparative review, a total of 60 Exploit kit explosion – part one products are put to the test on April 2010 Windows XP. John Hawes has all 23 COMPARATIVE REVIEW the details. page 23 VB100 – Windows XP SP3 68 END NOTES & NEWS ISSN 1749-7027 COMMENT ‘There is often little Troyak-AS resumed service under a new upstream provider, and this pattern was repeated numerous times. incentive for domain These less than dramatic results beg the registrars or hosting (multi)-million-dollar question: are such takedown providers to make efforts an exercise in futility? it more diffi cult for Certainly if one focuses only on short-term statistics, the answer would appear to be ‘yes’. However, if one criminals to obtain focuses on some of the precedents set during the fi rst services.’ quarter, tangible long-term impact may become a reality.
    [Show full text]