Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

Cybercriminals use CNET website to spread the infected VSDC installer

February 6, 2020

Doctor Web virus analysts report that VSDC video editor’s download link has been compromised on popular software platform CNET. Instead of the genuine program, visitors receive a modified installer bundled with malicious software, allowing cybercriminals to access the infected computers remotely. According to SimilarWeb statistics, monthly visits to CNET’s Downloads section is around 90 million users.

Earlier in 2019, we reported an attack on the website of the popular video editing freeware called VSDC. This time cybercriminals distribute the malicious installer through CNET's download[.]com by replacing the native download link on VSDC’s webpage with a fake one.

#drweb

The compromised link leads users to downloads[.]videosfotdev[.]com, which is a spoofed domain name controlled by hackers. Target selection is based on geolocation. Non-target users are redirected to the legitimate VSDC website, while the others receive a hacked installer, but with a valid digital signature.

The infection mechanism is implemented as follows. During the installation process, in addition to the actual program’s files, the installer creates two folders in the %userappdata% directory. One folder contains a normal set of files for the TeamViewer remote control application. The second folder contains a downloader trojan that further retrieves auxiliary malicious modules from the repository. These are .dll files detected as BackDoor.TeamViewer, which allows the trojan to establish an unauthorised connection to an infected computer, as well as a script for bypassing Microsoft Windows’s built-in anti-virus protection.

Utilising BackDoor.TeamViewer, the attackers are able to deliver payload modules with malware to infected devices, such as:

  • X-Key Keylogger,
  • Predator The Thief stealer,
  • SystemBC trojan-proxy, and
  • A trojan for remote control over RDP protocol.

It should be noted that one of the repositories contains a hacked NordVPN installer. It also carries the specified malicious components and has a valid digital signature.

All mentioned threats are successfully detected and removed by Dr.Web.

Doctor Web experts recommend all VSDC users check their devices with our antivirus.

Indicators of compromise

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2020

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040