Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to the news list

Account drainers and other virus threats of February 2011

March 2, 2011

The main malicious trends of the previous months persisted in February. Windows blockers and banking password stealers, where the latter ones worked together with fake anti-viruses, constituted a large portion of malicious traffic.

Windows blockers

The idea of extortionist Trojan horses blocking access to Windows has turned out to be a long-lasting one. During its evolution virus makers tried several money transfer options and technological solutions, some rather unexpected, including blocking the loading of Windows from the Master Boot Record.

Several Trojan.Winlockprograms featuring different block screen designs were discovered in February 2011. Apart from their new appearance, the blockers employed new tricks, making their analysis more difficult, and used more complex encryptors to disguise their executables. One such encryptor, popular with Trojan.Winlock writers, adds a specific icon into the executable making it easier to distinguish visually:

Since the scheme's implementation is so simple and efficient, blockers are unlikely to dwindle away. On the contrary, more sophisticated variations of this ransomware are likely to be discovered in the nearest future.

Encoders

Encoders were another type of ransomware that came into the spotlight in February. The author of Trojan.Encoder changed the encryption algorithm several times, but the number of corresponding Trojan horse modifications found in the wild didn't change. Doctor Web develops and maintains decoding utilities, enabling users to regain access to files compromised by Trojan.Encoder.

Bank account theft

A handful of account money stealers similar to the notorious Trojan.PWS.Panda, a.k.a. Zeus, entered February 2011’s malicious “top 10”. All these programs are modifications of the same viral prototype. The Trojan horse uses a comprehensive list of addresses of online banking systems. They include Russian, Italian, American, and German systems:

  • libertyreserve.com
  • perfectmoney.com
  • laiki.com
  • bankofcyprus.com
  • commbank.com.au
  • suncorpbank.com.au
  • stgeorge.com.au
  • online.westpac.com.au
  • anz.com
  • sparkasse.de
  • commerzbanking.de
  • finanzportal.fiducia.de
  • deutsche-bank.de
  • targobank.de
  • postbank.de
  • csebo.it
  • poste.it
  • gruppocarige.it
  • cedacri.it
  • payment.ru
  • ibank.alfabank.ru
  • chase.com
  • capitalone.com

Some Trojan horses of this family are detected by Dr.Web as Trojan.DownLoader2. Their additional payload includes downloading fake anti-viruses (Trojan.FakeAlert) and backdoors.

Mobile platforms

February saw a significant increase from January in the number of Trojan horses for Android. Android.SmsSend are written in Java, and their only feature is sending paid short messages at short codes such as 6008.

Only one sample of the Trojan horse was detected in January, but in February this figure increased to six which would suggest that it is only a matter of time before more dangerous and complex Trojan horses for this platform emerge.

Other threats

Other notable threats include new modifications of Win32.Virut and variations of mail worms Win32.HLLM.NetSky and Win32.HLLM.MyDoom, traditionally found in large numbers in mail traffic.

Developers of the Trojan.WinSpy botnet updated components of their bot software twice in February. Changes delivered with the updates mainly concerned encryption routines for the sfcfiles.dll file.

The virus analysts also noted reduced activity of worms spread over removable data storage devices (Win32.HLLW.Autorunner).

Viruses detected in February in mail traffic

 31.01.2011 00:00 - 28.02.2011 17:00  
1 Trojan.DownLoad2.20306 1059280 (9.63%)
2 Trojan.DownLoader2.265 1016989 (9.24%)
3 Win32.HLLM.MyDoom.33808 953395 (8.66%)
4 Win32.HLLM.Netsky.18401 678289 (6.16%)
5 Trojan.DownLoader2.1901 644263 (5.85%)
6 Trojan.DownLoader2.2035 573250 (5.21%)
7 Trojan.DownLoad1.58681 525054 (4.77%)
8 Trojan.DownLoader2.2977 494250 (4.49%)
9 Trojan.Packed.20878 378395 (3.44%)
10 Win32.HLLW.Texmer.51 362861 (3.30%)
11 Trojan.MulDrop.64589 339687 (3.09%)
12 Trojan.DownLoad.41551 314629 (2.86%)
13 Win32.HLLM.Netsky.35328 298101 (2.71%)
14 Trojan.Oficla.zip 278088 (2.53%)
15 Trojan.DownLoader2.10188 232049 (2.11%)
16 Trojan.Packed.20312 231918 (2.11%)
17 Trojan.DownLoader2.4077 159628 (1.45%)
18 Trojan.PWS.Siggen.12160 146696 (1.33%)
19 Trojan.Oficla.38 131266 (1.19%)
20 Win32.HLLM.Beagle 127493 (1.16%)
Total scanned:59,150,116,249
Infected:11,084,834 (0.02%)

Viruses detected in February on users' computers

 31.01.2011 00:00 - 28.02.2011 17:00 
1 Win32.HLLP.Whboy.45 12975162 (27.37%)
2 Win32.HLLP.Neshta 10063066 (21.23%)
3 Win32.HLLP.Novosel 6035651 (12.73%)
4 Trojan.Click.64310 5389563 (11.37%)
5 Win32.Siggen.8 1751123 (3.69%)
6 HTTP.Content.Malformed 1123179 (2.37%)
7 Win32.HLLP.Rox 1084446 (2.29%)
8 Win32.HLLP.Liagand.1 722176 (1.52%)
9 Win32.HLLP.Whboy 608324 (1.28%)
10 Win32.Sector.22 584357 (1.23%)
11 Win32.Virut 574516 (1.21%)
12 Trojan.MulDrop1.48542 533769 (1.13%)
13 Win32.Sector.20480 380038 (0.80%)
14 Win32.HLLW.Shadow.based 261680 (0.55%)
15 Win32.Antidot.1 246844 (0.52%)
16 Exploit.Cpllnk 233278 (0.49%)
17 Win32.Virut.56 214383 (0.45%)
18 Win32.HLLW.Autoruner.18959 151085 (0.32%)
19 Trojan.DownLoad.32973 144293 (0.30%)
20 Win32.HLLW.Autoruner.11962 132218 (0.28%)
Total scanned:128,616,744,271
Infected:47,509,667 (0.04%)

Tell us what you think

To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments