Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Tuesday Patch malware is causing computer users pain

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
truedelphi Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Oct-15-08 06:24 PM
Original message
Tuesday Patch malware is causing computer users pain
October 14th, 2008
Fake Microsoft Patch Tuesday malware campaign spreading
Posted by Dancho Danchev @ 3:00 pm

Categories: Patch Watch, Hackers, Microsoft, Spam and Phishing, Botnets, Passwords, Anti Virus, Malware

Tags: Security, Cybercrime, Social Engineering, Patch Tuesday, Dancho Danchev

27 TalkBacksPrintEmailThumbs UpThumbs Down+1923
Malicious attackers are once again taking advantage of event-based social engineering attacks, and are currently mass mailing fake notifications for Microsoft’s Patch Tuesday, attaching a copy of Trojan.Backdoor.Haxdoor, next to a legitimately looking PGP signature which is, of course, fake too :

“We received some questions from customers about an e-mail that’s circulating that claims to be a security e-mail from Microsoft. The e-mail comes with an attached executable, which it claims is the latest security update, and encourages the recipient to run the attached executable so they can be safe. While malicious e-mails posing as Microsoft security notifications with attached malware aren’t new (we’ve seen this problem for several years) this particular one is a bit different in that it claims to be signed by our own Steve Lipner and has what appears to be a PGP signature block attached to it. While those are clever attempts to increase the credibility of the mail, I can tell you categorically that this is not a legitimate e-mail: it is a piece of malicious spam and the attachment is malware. Specifically, it contains Backdoor:Win32/Haxdoor.”

Is timing everything when it comes to the success rate of such malware campaigns? Not necessarily.

Despite the touch points aiming to improve the trust factor, like mentioning a real Microsoft employee, spoofed FROM field as securityassurance AT microsoft.com, next to the PGP signature, given the fact that the emails aren’t personalized and that spam outbreaks spreading malware by capitalizing on Microsoft’s brand have cyclical pattern, namely, they re-appear every year (2005, 2007, 2008) the average end user is supposed to have a basic security awareness of this tactic. More info on the campaign :

Furthermore, this backdoor opens several TCP ports that allow remote attackers to connect to the comprmised PC and execute files, steal information from it, or upload and download files. The attachment’s file name varies, but uses the convention KBxxxxxx.exe, where xxxxxx is a random 6-digit number. Below are some of the file names we’ve seen, and are being used:

KB199250.exe
KB246586.exe
KB535548.exe
KB572906.exe
KB763412.exe

Compared to the recent targeted malware attack against U.S schools, and the massive fake CNN news items campaign taking advantage of client-side vulnerabilities, this one is definitely going to have a lower success rate - no matter the timing.

Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, malware and E-crime incident response. Dancho is also involved in business development, marketing research and competitive intelligence as an independent contractor. He's been an active security blogger since 2007, and maintains a popular security blog sharing real-time threats intelligence data with the rest of the community on a daily basis.
Printer Friendly | Permalink |  | Top
Inspired Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Oct-15-08 07:21 PM
Response to Original message
1. So, on Tuesday I got a warning from Avast on my lap top....
it said something about detecting malware. It gave me the recommendation action of deleting it. I tried and it wouldn't let me because the 'file was in use', even though I had no open programs running.

Is this related?

Printer Friendly | Permalink |  | Top
 
DarkTirade Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Oct-15-08 07:55 PM
Response to Reply #1
2. Just means that the program was running in the background, where you couldn't see it.
You should still be able to see it if you hit alt-ctrl-del and click on the 'processes' tab. And you can click on it and force it to stop working.

Although the smart ones usually have it set up so that if the program stops, it'll automatically open up another instance of it.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 05:55 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC