My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets


Back to the news list

October virus activity review from Doctor Web

November 1,2008

Doctor Web reviews activity of malware in October 2008 that turned out to be quite eventful. Numerous modifications of fake anti-viruses, tricks employed by spammers to hide malware in messages, new modifications of polymorphic and file viruses and various social engineering techniques. Below we’ll take a look at most widely used tricks and techniques and see how to counter them.

Critical updates of Windows
A release of an extra security update by Microsoft became a notable event. The security patch fixed vulnerability in Windows 2000, Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008 with all registered customers urged to install the update via-email. It is even more remarkable that the critical flaw was also found in he upcoming Windows 7 that has only hit Pre-Beta. According to a description the vulnerability concerns the security system of Windows that allows a remote attacker to pass validation and get full control of a targeted machine. An exploit of the vulnerability spreading over the Internet made Microsoft rush with the update. The exploit entered the Dr.Web virus database as Win32.HLLW.Jimmy. This incident shows that prompt installation of critical security updates is essential for the security of a system.

File viruses
A lot of reports from users concerned another modification of the Win32.Sector file virus — Win32.Sector.12. Users of Dr.Web software with the updated virus database were protected against attempt of this malicious program to get into a system. If a system has been infected by the virus, curing Win32.Sector.12 can be troublesome because it injects its code in the memory of running processes, can disrupt operation of an anti-virus and is equipped with rootkit technologies. Malicious programs from the Win32.Sector family can download malware from the Internet and install it on user machines and update the malware from web-sites that spread it. If curing such a virus causes any problems to a user of Dr.Web software, our technical specialists are always ready to support customers of Doctor Web.

In October a large amount of spam messages was aiming to spread various modifications of Trojan.DownLoad.4419. This Trojan was already described in our September virus review. Usually such messages were brief and contained a link to a supposed pornographic video. While earlier such links lead a user to a fake YouTube web-page, in October careless users clicking on the link were displayed a simpler interface (see the image below). Regardless of the appearance download of an executable file started as soon as the page was loaded. A wide variety and similarity of modifications of Trojan.DownLoad.4419 made it possible for analysts of Doctor Web to create several entries that ensured detection of almost any sample from this Trojan family. In October entries for Trojan.Packed.1207 and Trojan.Packed.1219 were also added to the database.

In October virus makers also reminded Internet community about malware placed in an archive protected by a password. Typically the password was placed in the message body while the contents of an archive was detected by Dr.Web anti-viruses as Trojan.PWS.GoldSpy.2268.

Anti-virus vendors have recently urged users to check the address bar of a browser as they follow a link provided in a message. Virus makers often replace an address displayed in a link by something quite different. Trojan.Click.21207 shoed that a faked page is not necessary for a virus trying to get to a computer and that an offered link can also look harmless. In this case a user saw a link to a .jpeg file which turned out to be malicious JavaScript code.

Among most significant Trojan mailings of October we’d like to mention Trojan.Packed.1198 which is remarkable for its mentioning of Angelina Jolie in the message subject. There was also a mailing of messages in German prompting a receiver to look through an important financial document that turned out to be malicious programs detected as Trojan.DownLoad.3735 or Trojan.DownLoad.8932.

Warming! Beware of scams!
October was also marked by the increase in the number of scams that lured a user to send an SMS that would cost a certain amount of money. In Russia one of such mailings offered a user to participate in a bonus offer from one of the leading mobile operators in the country. Scammers have been luring users to send short messages more and more often. The main reason for growing popularity of such frauds is worldwide popularity of mobile phones.

ICQ as the transport of ill-intended messages
Spam has become an ordinary thing for users of ICQ. Spam-messages provide links to malicious programs the same way as e-mail. In October ICQ spammers advertised Adware.FieryAds.4, and many others. They also attempted to persuade a user into sending a paid short message using a mobile phone. It should also be mentioned that in October ICQ spam was more often sent from a registered UID belonging to a user whose machine had been compromised. In such cases there were no other indication of malicious activates in the system. The only way for a user to learn about the infection was from people included in his contact list.

Virus makers kept exploiting social networking web-sites number of which was growing steadily in the Internet. One of the ways to spread Trojan.Packed.673 using a social network was the creation of a special account that was used to rate images of other members of the network. A registered member of the social networking web-site loaded a page displaying information about the account and came across with a link to a personal page of a supposed owner of the account. Clicking on the link started downloading of malware.

October revealed new spammer tricks and growing yet growing amount of spam. Unfortunately in most cases users launch malicious programs themselves. That’s why specialists of our company do their best to inform users about basics of information security.

Viruses detected in e-mail traffic

 01.10.2008 00:00 - 01.11.2008 00:00 
1Trojan.Click.1975429330 (15.85%)
2Trojan.PWS.GoldSpy.226815475 (8.36%)
3Win32.HLLM.MyDoom.based14635 (7.91%)
4Win32.Virut13743 (7.43%)
5Trojan.DownLoad.373511076 (5.99%)
6Trojan.PWS.GoldSpy.227710715 (5.79%)
7Trojan.Inject.374210262 (5.55%)
8Trojan.MulDrop.178297002 (3.78%)
9Win32.HLLM.Netsky.353286208 (3.35%)
10Win32.HLLW.Autoruner.26405096 (2.75%)
11Trojan.MulDrop.134084090 (2.21%)
12Trojan.MulDrop.167273950 (2.13%)
13Trojan.Copyself3484 (1.88%)
14Win32.HLLW.Autoruner.12523376 (1.82%)
15Win32.HLLM.Alaxala3321 (1.79%)
16Trojan.PWS.Panda.313299 (1.78%)
17Win32.HLLM.Beagle2646 (1.43%)
18Trojan.MulDrop.182802622 (1.42%)
19BackDoor.Bulknet.2371985 (1.07%)
20Trojan.PWS.GoldSpy.22781977 (1.07%)

Viruses detected on workstations

 01.10.2008 00:00 - 01.11.2008 00:00 
1Win32.HLLW.Gavir.ini1336089 (17.58%)
2DDoS.Kardraw402787 (5.30%)
3Win32.Alman322084 (4.24%)
4Trojan.MulDrop.18538277195 (3.65%)
5Win32.HLLP.Whboy239879 (3.16%)
6VBS.Autoruner.10224391 (2.95%)
7Win32.HLLM.Lovgate.2218691 (2.88%)
8Win32.HLLM.Generic.440190744 (2.51%)
9JS.Click.22172206 (2.27%)
10Win32.HLLW.Autoruner.2255152617 (2.01%)
11VBS.Generic.548144545 (1.90%)
12Trojan.DownLoader.22881110771 (1.46%)
13VBS.PackFor106047 (1.40%)
14Win32.HLLP.Jeefo.36352104866 (1.38%)
15Win32.HLLW.Autoruner.233981624 (1.07%)
16Win32.HLLO.Black.277968 (1.03%)
17Trojan.MulDrop.998577118 (1.01%)
18Win32.HLLW.Autoruner.102070904 (0.93%)
19Win32.Sector.2048070541 (0.93%)
20Win32.Sector.569635 (0.92%)

Tell us what you think

To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.

Other comments

© Doctor Web
2003 — 2023

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies