Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

Elimination of botnet and other viral events in March 2011

April 4, 2011

March 2011 was eventful in the field of information security. The major news includes Trojan horses in payment terminals and the elimination of the world's largest spam network–the Trojan.Spambot botnet, also known as Rustock. In addition, criminals launched a number of large-scale attacks on social networking sites. And, as expected, the disaster in Japan became the topic of many spam mailings.

Trojan.Spambot botnet shut down

On March 17, 2011, the largest generator of spam, the Trojan.Spambot botnet, ceased its operation. Twenty-six command centers of the botnet became non-operational, and hundreds of thousands of bots, left without anything to control them, went into hibernation.

According to Microsoft, a computer infected with Trojan.Spambot could send up to 10,000 messages per hour. Some experts estimate that the number of bots in the spam network was around 815,000. Thus, the total spam traffic generated by the botnet Trojan.Spambot could reach several billion messages per day. Microsoft was said to have played a key part in a joint operation with US authorities to behead the Trojan.Spambot botnet.

Trojan.Spambot, the first known examples of which date back to 2005, became one of the most technologically advanced and complex malware species. Its developer perfected the program for several years, and an analysis of the Trojan's code served as the source of many analytical publications.

A civil lawsuit filed by Microsoft against the unidentified individuals behind this botnet became the legal basis of the operation. According to widespread belief, the attackers are of Russian origin.

It is still difficult to make predictions about the future of the spam industry. The significant damage caused by the closure of the largest spam networks can be quickly reversed by the growth of other botnets. Win32.HLLM.Beagle, whose activity in recent years was low, has taken the leading position as the largest generator of spam traffic. Both spam networks specialize in so-called “pharma spam”—the advertising of drugs.

In the future, we can expect botnet architecture to move towards decentralization. Also, some think that the Trojan.Spambot botnet will recover.

Trojan horses in terminals

In March 2011 Doctor Web announced the discovery of a new modification of Trojan.PWS.OSMP that infects express payment terminals. This Trojan horse modifies the account numbers of payment recipients. And its latest modification probably enables criminals to create virtual terminals.

Interestingly, the Trojan horse wasn't detected during the analysis of a compromised terminal but while monitoring the botnet of another Trojan horse that enables Trojan.PWS.OSMP to get into terminal systems.

A terminal is infected in two stages. First, the terminal is compromised by BackDoor.Pushnik, which is a 620 KB, packed executable file written in Delphi and spread via removable media. Once installed, the Trojan gets instructions from command centers and, after several intermediate steps, downloads and runs a 60-70 KB binary file containing Trojan.PWS.OSMP. It looks through the running processes in search of the maratl.exe process which is a part of the payment terminal software environment. If successful, the Trojan horse injects its code into the process and replaces the recipient’s account number in the process' memory with the criminal's account number.

The latest known version of the Trojan horse implements a different scheme of fraud. Trojan.PWS.OSMP copies a configuration file of the payment terminal to its server. A stolen configuration file is supposed to help criminals create a fake terminal on their computer, which should allow them to redirect transferred funds to their account.

New critical vulnerabilities in Adobe products

On March 14, 2011, Adobe Systems announced the discovery of another vulnerability in Adobe Flash Player 10.2.152.33 and in some of its earlier versions.

The vulnerability allows intruders to attack a system using an swf file. This vulnerability exists in the versions of the product for Windows, Mac OS, Linux, Solaris, and earlier versions of Android.

Updates closing the vulnerability were released only on March 21. Thus, the vulnerability remained unclosed for a week. Shortly afterwards, source code examples showing how the vulnerability was exploited became available to the public on the Internet.

An attack is conducted by means of an xls file with an embedded swf object:

Figure 1. The embedded swf file in an Excel document.

This swf file loads shell-code into memory and then executes an attack on the vulnerable flash-player, using the Heap Spray technique. Then the swf file code loads a second swf file that exploits the vulnerability in the bytecode interpreter ActionScript CVE-2011-0609, common to all vulnerable systems.

The demonstration of the vulnerability provoked mailings of messages with an attached Trojan xls file that included Exploit.SWF.169. When the file is launched, MS Excel stops responding for some time, and the user sees an empty table with an embedded flash video clip that doesn't display anything.

Figure 2. Loading an MS Excel document containing Exploit.SWF.169.

Meanwhile Exploit.SWF.169 carries out a local attack. It saves to the disk and runs the executable file with the Trojan.MulDrop1.64014 or Trojan.MulDrop.13648 payload.

Attacks on social networking websites

Nowadays social networking websites are popular targets of hacker attacks. The last month provided another confirmation of that trend—LiveJournal and Facebook came under attack.

On March 4, 2011, a mass mailing of phishing emails sent on behalf of LiveJournal’s administration was carried out. Messages contained a notice about suspension and probable removal of LiveJournal accounts.

The sender field of the phishing emails contained the do-not-reply@livejournal.com address which is actually used to send notifications to LiveJournal users. A fraudulent link was provided to would-be victims; it directed them to a bogus website livejorrnal.com or xn--livejurnal-ivi.com.

Users following the link ended up on a page that mimicked the original LiveJournal design. Data entered by users on the page was transmitted to fraudsters.

Figure 3. Fraudulent page that duplicates the look of LiveJournal.

A few days later Facebook suffered a similar attack. Its users began receiving spam messages sent on behalf of existing Facebook accounts. Such messages contained a short URL (the trick commonly employed for such attacks). It prevents users from learning beforehand where the link leads. In this case, it led to a fraudulent page that copied the Facebook design. This page contained a notification and prompted users to submit their personal information. If victims filled in the requested fields, the attacker gained access to their individual accounts and then used those accounts to send a similar fraudulent message to the friends on the victim's list.

Obviously, criminals continue to refine their social engineering techniques and methods in attacks via social networking sites.

On March 30, 2011, LiveJournal suffered another DDoS-attack. The service administration estimated it to be the largest in its history. The attack continued for several hours, and during this time the service was virtually unavailable.

A wave of spam related to the disaster in Japan

As expected, there were attackers ready to exploit others’ misfortune, and the disaster in Japan was followed by a wave of spam messages on corresponding topics.

Some samples of spam contained calls for donations, and the supposed senders included well-known charity organizations (Red Cross, Salvation Army, etc.).

The message body usually contained a link to a fraudulent resource that was ready to accept donations.

Figure 4. Fake page for the Red Cross.

In other cases users were lured to malicious resources. For example, a message offered users the opportunity to watch a video of the disaster and provided a corresponding link.

Figure 5. Spam messages with a link to a Japan disaster video.

When the user tried to view the video, they were redirected to a malicious site from which Trojan.FakeAlert was installed onto their computer.

Figure 6. The result after attempting to view a Japan disaster video.

Criminals are taking advantage of this occasion to spread a wide range of Trojan software: fake anti-viruses and system utilities, and all kinds of blockers.

Viruses detected in March in mail traffic

 01.03.2011 00:00 - 31.03.2011 01:00 
1 Trojan.Inject.28090 2517487 (9.89%)
2 Trojan.Inject.27975 2063777 (8.10%)
3 Trojan.DownLoad2.20306 1656904 (6.51%)
4 Trojan.DownLoader2.22364 1457945 (5.73%)
5 Trojan.Inject.28053 1358480 (5.33%)
6 Trojan.DownLoader2.265 1352313 (5.31%)
7 Win32.HLLM.MyDoom.33808 1184204 (4.65%)
8 Trojan.DownLoader2.17823 1057371 (4.15%)
9 Trojan.DownLoader2.1901 1030685 (4.05%)
10 Trojan.DownLoader2.2035 940626 (3.69%)
11 Trojan.DownLoader2.2977 837149 (3.29%)
12 Win32.HLLM.Netsky.18401 834193 (3.28%)
13 Trojan.DownLoader2.10188 682540 (2.68%)
14 Trojan.DownLoad1.58681 568003 (2.23%)
15 Trojan.DownLoader2.16572 563631 (2.21%)
16 Trojan.Packed.20878 409260 (1.61%)
17 Win32.HLLW.Texmer.51 404317 (1.59%)
18 Win32.HLLM.Netsky.35328 369690 (1.45%)
19 Trojan.MulDrop.64589 367488 (1.44%)
20 Trojan.DownLoad.41551 341949 (1.34%)
Total scanned:74,983,221,402
Infected:25,463,678 (0.03%)

Viruses detected in March on users' computers

 01.03.2011 00:00 - 31.03.2011 01:00 
1 Win32.HLLP.Neshta 16013222 (29.74%)
2 Win32.HLLP.Novosel 11746302 (21.82%)
3 JS.IFrame.95 5125132 (9.52%)
4 Win32.HLLP.Whboy.45 4336264 (8.05%)
5 Win32.Siggen.8 3985715 (7.40%)
6 Win32.HLLW.Whboy 2565223 (4.76%)
7 ACAD.Pasdoc 1072822 (1.99%)
8 Trojan.MulDrop1.48542 486108 (0.90%)
9 Trojan.Click.64310 462653 (0.86%)
10 Win32.Antidot.1 455366 (0.85%)
11 JS.Click.22 393754 (0.73%)
12 Win32.HLLP.Whboy 254289 (0.47%)
13 Win32.HLLW.Shadow.based 241028 (0.45%)
14 Win32.Sector.22 229577 (0.43%)
15 Win32.HLLP.Rox 216080 (0.40%)
16 Win32.Sector.12 204476 (0.38%)
17 Trojan.Packed.21230 186951 (0.35%)
18 Exploit.Cpllnk 168504 (0.31%)
19 Win32.Virut.56 155258 (0.29%)
20 Trojan.DownLoad.32973 142519 (0.26%)
Total scanned:139,536,970,982
Infected:53,840,333 (0.04%)

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2019

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040