March 2, 2011
Windows blockers
The idea of extortionist Trojan horses blocking access to Windows has turned out to be a long-lasting one. During its evolution virus makers tried several money transfer options and technological solutions, some rather unexpected, including blocking the loading of Windows from the Master Boot Record.
Several Trojan.Winlockprograms featuring different block screen designs were discovered in February 2011. Apart from their new appearance, the blockers employed new tricks, making their analysis more difficult, and used more complex encryptors to disguise their executables. One such encryptor, popular with Trojan.Winlock writers, adds a specific icon into the executable making it easier to distinguish visually:
Since the scheme's implementation is so simple and efficient, blockers are unlikely to dwindle away. On the contrary, more sophisticated variations of this ransomware are likely to be discovered in the nearest future.
Encoders
Encoders were another type of ransomware that came into the spotlight in February. The author of Trojan.Encoder changed the encryption algorithm several times, but the number of corresponding Trojan horse modifications found in the wild didn't change. Doctor Web develops and maintains decoding utilities, enabling users to regain access to files compromised by Trojan.Encoder.
Bank account theft
A handful of account money stealers similar to the notorious Trojan.PWS.Panda, a.k.a. Zeus, entered February 2011’s malicious “top 10”. All these programs are modifications of the same viral prototype. The Trojan horse uses a comprehensive list of addresses of online banking systems. They include Russian, Italian, American, and German systems:
- libertyreserve.com
- perfectmoney.com
- laiki.com
- bankofcyprus.com
- commbank.com.au
- suncorpbank.com.au
- stgeorge.com.au
- online.westpac.com.au
- anz.com
- sparkasse.de
- commerzbanking.de
- finanzportal.fiducia.de
- deutsche-bank.de
- targobank.de
- postbank.de
- csebo.it
- poste.it
- gruppocarige.it
- cedacri.it
- payment.ru
- ibank.alfabank.ru
- chase.com
- capitalone.com
Some Trojan horses of this family are detected by Dr.Web as Trojan.DownLoader2. Their additional payload includes downloading fake anti-viruses (Trojan.FakeAlert) and backdoors.
Mobile platforms
February saw a significant increase from January in the number of Trojan horses for Android. Android.SmsSend are written in Java, and their only feature is sending paid short messages at short codes such as 6008.
Only one sample of the Trojan horse was detected in January, but in February this figure increased to six which would suggest that it is only a matter of time before more dangerous and complex Trojan horses for this platform emerge.
Other threats
Other notable threats include new modifications of Win32.Virut and variations of mail worms Win32.HLLM.NetSky and Win32.HLLM.MyDoom, traditionally found in large numbers in mail traffic.
Developers of the Trojan.WinSpy botnet updated components of their bot software twice in February. Changes delivered with the updates mainly concerned encryption routines for the sfcfiles.dll file.
The virus analysts also noted reduced activity of worms spread over removable data storage devices (Win32.HLLW.Autorunner).
Viruses detected in February in mail traffic
31.01.2011 00:00 - 28.02.2011 17:00 | ||
1 | Trojan.DownLoad2.20306 | 1059280 (9.63%) |
2 | Trojan.DownLoader2.265 | 1016989 (9.24%) |
3 | Win32.HLLM.MyDoom.33808 | 953395 (8.66%) |
4 | Win32.HLLM.Netsky.18401 | 678289 (6.16%) |
5 | Trojan.DownLoader2.1901 | 644263 (5.85%) |
6 | Trojan.DownLoader2.2035 | 573250 (5.21%) |
7 | Trojan.DownLoad1.58681 | 525054 (4.77%) |
8 | Trojan.DownLoader2.2977 | 494250 (4.49%) |
9 | Trojan.Packed.20878 | 378395 (3.44%) |
10 | Win32.HLLW.Texmer.51 | 362861 (3.30%) |
11 | Trojan.MulDrop.64589 | 339687 (3.09%) |
12 | Trojan.DownLoad.41551 | 314629 (2.86%) |
13 | Win32.HLLM.Netsky.35328 | 298101 (2.71%) |
14 | Trojan.Oficla.zip | 278088 (2.53%) |
15 | Trojan.DownLoader2.10188 | 232049 (2.11%) |
16 | Trojan.Packed.20312 | 231918 (2.11%) |
17 | Trojan.DownLoader2.4077 | 159628 (1.45%) |
18 | Trojan.PWS.Siggen.12160 | 146696 (1.33%) |
19 | Trojan.Oficla.38 | 131266 (1.19%) |
20 | Win32.HLLM.Beagle | 127493 (1.16%) |
Total scanned: | 59,150,116,249 |
Infected: | 11,084,834 (0.02%) |
Viruses detected in February on users' computers
31.01.2011 00:00 - 28.02.2011 17:00 | ||
1 | Win32.HLLP.Whboy.45 | 12975162 (27.37%) |
2 | Win32.HLLP.Neshta | 10063066 (21.23%) |
3 | Win32.HLLP.Novosel | 6035651 (12.73%) |
4 | Trojan.Click.64310 | 5389563 (11.37%) |
5 | Win32.Siggen.8 | 1751123 (3.69%) |
6 | HTTP.Content.Malformed | 1123179 (2.37%) |
7 | Win32.HLLP.Rox | 1084446 (2.29%) |
8 | Win32.HLLP.Liagand.1 | 722176 (1.52%) |
9 | Win32.HLLP.Whboy | 608324 (1.28%) |
10 | Win32.Sector.22 | 584357 (1.23%) |
11 | Win32.Virut | 574516 (1.21%) |
12 | Trojan.MulDrop1.48542 | 533769 (1.13%) |
13 | Win32.Sector.20480 | 380038 (0.80%) |
14 | Win32.HLLW.Shadow.based | 261680 (0.55%) |
15 | Win32.Antidot.1 | 246844 (0.52%) |
16 | Exploit.Cpllnk | 233278 (0.49%) |
17 | Win32.Virut.56 | 214383 (0.45%) |
18 | Win32.HLLW.Autoruner.18959 | 151085 (0.32%) |
19 | Trojan.DownLoad.32973 | 144293 (0.30%) |
20 | Win32.HLLW.Autoruner.11962 | 132218 (0.28%) |
Total scanned: | 128,616,744,271 |
Infected: | 47,509,667 (0.04%) |
Tell us what you think
To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.
Other comments