Перейти к содержимому


Фото
- - - - -

Christmas – the best time for viruses


  • Please log in to reply
Нет ответов в данной теме

#1 News Robot

News Robot

    Creator of the News

  • Dr.Web Staff
  • 8 017 Сообщений:

Отправлено 18 Январь 2011 - 03:00

January 18, 2011



December capped off 2010 as a grand finale for virus writers, for this month witnessed the spread of malicious programs that featured all of the technologies developed over the course of the year. The ne’er-do-wells also used new technologies in their malicious programs to uninstall anti-virus software in compromised systems. And, as if that were not enough, Western European users were hit on Christmas day by an outbreak of malware that generates fake Internet search results.




Holidays — the best time to spread viruses


It’s hard to say why virus makers choose to spread the fruits of their labour during major holidays. Perhaps, they believe that anti-virus vendors won’t respond in a timely manner to emerging threats during holidays or that users won’t have the time or energy to deal with infections, and thus their chances of success will be higher. Even the fact that most company virus analysts work around the clock doesn’t affect the trend.



This past Christmas, Western European users experienced an outbreak of Trojan.Hottrend.32. This malicious program was added to the Dr.Web virus database on December 8, but the peak of its upsurge occurred on December 24 and 25.



Many anti-viruses failed to cure Trojan.Hottrend.32 completely. As a result, systems that were supposedly cured wouldn’t boot after a restart, but would crash and display a BSOD.



Trojan.Hottrend.32 is a multi-component program. Many anti-viruses were able to detect its malicious libraries found in Windows system directories and delete them. However, they didn’t restore the system files that were infected during the Trojan’s installation that made the respective processes use the malicious libraries. Yet users of Dr.Web didn’t have to deal with system crashes since their anti-virus cured the infection successfully by removing the malicious dll files and restoring the infected system files to their original state. Files infected by the Trojan are detected by Dr.Web as Win32.Dat.15..



Interestingly Trojan.Hottrend has a few features common to other malicious programs. For example, the installer of Trojan.Hottrend.34 exploits the vulnerability that was used earlier by BackDoor.Tdss (a.k.a. TDL4) to increase its privileges under the latest versions of Windows. And that was the vulnerability of the Windows Task Scheduler. This Trojan component incorporated into Trojan.Hottrend is detected by Dr.Web as Exploit.TaskScheduler.1. Trojan.Hottrend.34 can also take advantage of the vulnerability of the Windows printing subsystem. A similar stunt was pulled in a previous Trojan.PWS.Ibank.279 program.




Anti-viruses can be removed again


The Trojan.VKBase.1, a multi-component malicious program capable of removing the latest versions of anti-viruses from computers, was discovered in December. The Trojan restarted a system in the Safe mode to remove the installed anti-virus. Since the self-protection module of Dr.Web anti-viruses remains operational even in the Safe mode, the malicious program downloaded an additional module — Trojan.AVKill.2942 — that exploited a vulnerability in the Dr.Web software. The vulnerability was closed in a timely manner, so Dr.Web users were the first to be protected against such attacks.



The ultimate goal of Trojan.VkBase.1 was a trivial one—to block access to the system and demand a ransom from the user to unlock it. Yet once access to the system was regained, another surprise awaited the victim. Even though the installed anti-virus had been uninstalled, the user was tricked into thinking that it was still up and running. Virus makers used the Trojan.Fakealert.19448 module to maintain the illusion.




Internet fraud in December


The average number of requests per day from users falling victim to cyber fraud increased insignificantly (by 5%) and reached 164 requests per day.



The number of Windows blockers demanding a cell phone balance refill increased to 70% of all malicious programs related to Internet fraud. It seems that the criminals using the blockers have almost completely shifted their preferences from payments with short messages towards balance refills, but standard schemes involving short messages and other types of malware are still in use.



A new variant of the scheme involving user transfer of funds to criminal cell phone accounts also gained popularity in December. Here users didn't even have to search for a payment terminal. Instead, they were given the opportunity to transfer money from their cell phone accounts to those belonging to criminals. An account-to-account transfer service is now provided by all known mobile operators. The share of support requests related to the scheme reached 25% of the total number of user requests in December, while in November 2010, no such requests were received.




Other threats in December 2010


Statistics collected by Doctor Web during the month also indicate that botnet client malware (Trojan.Oficla) was spread widely over e-mail as well as malicious programs removing installed anti-virus software (Trojan.AVKill). Trojan.PWS.Panda, which steals passwords in user systems, was found in large numbers in the wild too.



If you take a look at the malware statistics found on user machines, you will see that malicious programs exploiting the Windows shortcut vulnerability (Exploit.Cpllnk) are still among the top 20 most widely spread viruses despite the fact that a patch closing the vulnerability was released by Microsoft in early August 2010. This demonstrates that many users still have not installed the critical system updates that were released several months ago, i.e. the failure to follow the most basic rules of information security have increased their risk for system infection.




Malicious files detected in mail traffic in December





01.12.2010 00:00 - 01.01.2011 00:00






1


Trojan.DownLoad1.58681


585624 (10.67%)




2


Trojan.Packed.20878


424313 (7.73%)




3


Trojan.Oficla.zip


310037 (5.65%)




4


Trojan.Packed.20312


258656 (4.71%)




5


Trojan.DownLoad.41551


241333 (4.40%)




6


Trojan.Oficla.38


146380 (2.67%)




7


Trojan.AVKill.2788


111996 (2.04%)




8


Win32.HLLM.Beagle


108907 (1.98%)




9


Trojan.PWS.Panda.114


94719 (1.73%)




10


W97M.Killer


86120 (1.57%)




11


Trojan.DownLoader1.17157


68893 (1.25%)




12


Win32.HLLW.Autoruner.35407


60270 (1.10%)




13


Trojan.MulDrop1.54160


52069 (0.95%)




14


Trojan.PWS.Panda.387


51701 (0.94%)




15


Trojan.Oficla.48


51661 (0.94%)




16


Trojan.Oficla.73


51660 (0.94%)




17


Trojan.Botnetlog.zip


43136 (0.79%)




18


Win32.HLLM.MyDoom.54464


36344 (0.66%)




19


Trojan.AVKill.3097


35781 (0.65%)




20


Trojan.Inject.12703


34457 (0.63%)






Total scanned: 49,621,212,845


Infected: 5,489,646




Malicious files detected on user computers in December





01.12.2010 00:00 - 01.01.2011 00:00






1


Win32.HLLP.Whboy.45


26157925 (35.09%)




2


Win32.HLLP.Neshta


19074952 (25.59%)




3


Win32.Siggen.8


9701550 (13.01%)




4


Win32.HLLP.Whboy.105


3029087 (4.06%)




5


Win32.HLLP.Rox


1778666 (2.39%)




6


Win32.HLLP.Novosel


1694940 (2.27%)




7


Win32.Antidot.1


1417299 (1.90%)




8


ACAD.Pasdoc


880117 (1.18%)




9


Win32.HLLP.Whboy


837595 (1.12%)




10


Trojan.MulDrop1.48542


813936 (1.09%)




11


JS.Nimda


649954 (0.87%)




12


HTTP.Content.Malformed


500629 (0.67%)




13


Trojan.DownLoad.32973


373241 (0.50%)




14


Win32.HLLW.Shadow.based


348344 (0.47%)




15


Exploit.Cpllnk


338660 (0.45%)




16


Win32.Sector.22


310594 (0.42%)




17


Win32.HLLW.Autoruner.5517


206193 (0.28%)




18


Win32.Sector.21


185741 (0.25%)




19


Trojan.MulDrop.54146


176975 (0.24%)




20


Trojan.DownLoader.42350


175097 (0.23%)






Total scanned: 112,698,120,297


Infected: 74,550,079







View the article