Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to the news list

Grandmasters of cyber-fraud look for gains: November 2010 virus review from Doctor Web

December 3, 2010

In November cyber-criminals demonstrated even greater creativity than before. As a result, anti-virus vendors and users were confronted with new fraud techniques involving bootkit technologies. New modifications of encoder Trojans targeted European users. Criminals seeking the biggest gains attacked online banking systems.

Windows boot blocker

As soon as Trojan.MBRlock.1 appeared in the wild in November, it was employed by cyber-fraudsters. This malicious program is unlike any other malware used to implement fraud schemes.

It bypasses the UAC protection mechanism, so its installation goes unnoticed by users. Once installed, the Trojan writes its code into the MBR and into other nearby disk sectors.

The code, written to the MBR, loads information from the neighbouring disk sectors. The result is a message to users demanding that they pay $100 to unlock their systems.

The message also informs a user that all of the files located on all of the computer’s disks are encrypted. This is not true.

In any event curing the Trojan-compromised system can’t be done from inside the system since it wouldn’t boot.

Entering a correct password restores the MBR after which the installed operating system boots normally.

Currently several modifications of Trojan.MBRlock.1 are known, but Dr.Web detects them as the same piece of malware.

To cure the system, enter an ekol or jail unlock code. If neither works, contact the free Doctor Web technical support service for victims of cyber-fraud.

Certain modifications of Trojan.MBRlock.1 had been detected by the Dr.Web heuristic analyzer as MULDROP.Trojan before a corresponding entry was added to the Dr.Web virus database. Dr.Web users were protected from the Trojan even when no virus definitions for this malicious program were available.

New Trojan encoder

Encoder Trojans drew the public’s attention once again in November. This time criminals targeted European users.

Trojan.Encoder.88 uses the AES-256 encryption algorithm to encrypt documents in many popular formats which complicates decryption. To search all possible decryption keys for one that would help restore files on a single computer, 2^256 operations are required. The resulting number exceeds the number that ends in 77 zeros.

A unique encryption key is generated for each compromised machine. It is encrypted using the RSA algorithm and saved to a disk as a text file.

Origins Tracing technology enabled Dr.Web to detect Trojan.Encoder.88 as Trojan.Encoder.origin even before an entry for this program was added to the database.

Fraud in November: winlocks returned

In November the free technical support service received around 4,700 requests from cyber-fraud victims which constituted 42% of all requests. The daily average of requests amounted to 146 which exceeded the October figure by one third.

Trojan.Winlock became the most widely spread malicious program used for fraud (73% of all requests). A significant number of fraud incidents were related to Trojan.Hosts that blocked access to popular web resources.

Criminals also changed routines for converting their profit into actual money. Malicious programs demanding that users send paid short messages were less popular in November, and the number of requests related to such programs reached only 31% of the total. Meanwhile the option that involves paying criminals via terminals became more appealing to fraudsters (60% of all requests).

Banking Trojans on the offensive

November saw the emergence of new Trojans targeting users of online banking systems, both individuals and businesses.

In particular, several modifications of Trojan.PWS.Ibank.213 were added to the Dr.Web virus database.

Variations of the Trojan serve as containers of malicious payloads. Their most harmful feature is their ability to disable security software components. The Trojan can detect whether it is being launched in a virtual environment where it can be safely analyzed. Disabling the system restore service is also among its malicious capabilities.

To collect the information required to access bank accounts online, the Trojan intercepts certain system routines as well as functions of online banking systems, and stores information entered by a user with a keyboard. The fact that Trojan.PWS.Ibank.213 can communicate with a remote server, and download and launch executable files, shows that systems compromised by this program become nodes of a botnet.

November 2010 showed that criminals can make use of various malicious programs to accomplish a wide variety of tasks. When it comes to neutralizing them, anti-viruses capable of protecting a system from all kinds of malware and of curing it proved to be the most efficient. Yet, it is users who still remain the weakest element of the computer defense system. Doctor Web would like to emphasize once again that following basic information security rules dramatically reduces the probability of system infection.

Viruses detected in e-mail traffic in November

 01.11.2010 00:00 - 01.12.2010 00:00 
1Trojan.DownLoader.62844887472 (16.61%)
2Trojan.DownLoad1.58681560304 (10.49%)
3Trojan.Packed.20878409498 (7.67%)
4Win32.HLLW.Texmer.51386408 (7.23%)
5Win32.HLLM.Netsky.18401317070 (5.93%)
6Trojan.Oficla.zip296642 (5.55%)
7Win32.HLLM.MyDoom.33808270438 (5.06%)
8Trojan.Packed.20312246743 (4.62%)
9Trojan.DownLoad.41551231569 (4.33%)
10Trojan.Oficla.38139866 (2.62%)
11Win32.HLLM.Netsky.35328121814 (2.28%)
12Trojan.AVKill.2788103700 (1.94%)
13Win32.HLLM.Beagle98470 (1.84%)
14Trojan.PWS.Panda.11490471 (1.69%)
15W97M.Killer74444 (1.39%)
16Trojan.DownLoader1.1715765832 (1.23%)
17Trojan.PWS.Panda.38749461 (0.93%)
18Trojan.Oficla.7349351 (0.92%)
19Trojan.Oficla.4849342 (0.92%)
20Trojan.Botnetlog.zip41304 (0.77%)

Total scanned:40,984,945,769
Infected:5,342,395

Viruses detected on user machines in November

<
 01.11.2010 00:00 - 01.12.2010 00:00 
1Win32.HLLP.Neshta 7665428 (24.91%)
2Win32.HLLP.Whboy.45 6184396 (20.09%)
3Trojan.DownLoader.423502364188 (7.68%)
4Win32.HLLP.Novosel1644766 (5.34%)
5Win32.HLLP.Rox1177270 (3.82%)
6Trojan.Click.64310727694 (2.36%)
7ACAD.Pasdoc610404 (1.98%)
8Win32.HLLM.Dref520690 (1.69%)
9Exploit.Cpllnk413622 (1.34%)
10VBS.Redlof320729 (1.04%)
11Trojan.WinSpy.925284258 (0.92%)
12Win32.HLLW.Shadow.based278980 (0.91%)
13Trojan.PWS.Ibank.238252705 (0.82%)
14HTTP.Content.Malformed244692 (0.80%)
15Trojan.MulDrop1.48542183156 (0.60%)
16Trojan.Click1.6029180330 (0.59%)
17Win32.Sector.22142436 (0.46%)
18Win32.HLLW.Kati121106 (0.39%)
19Trojan.DownLoad.32973114280 (0.37%)
20Win32.HLLW.Autoruner.5555100817 (0.33%)
Total scanned:92,810,136,138
Infected:30,778,334

Tell us what you think

To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments