Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

Virus activity review for July 2009 from Doctor Web

July 31, 2009

Doctor Web presents the virus activity review for July 2009. New exploits for Windows and several popular applications became the main trend of the past month . Even though in July malicious code was least likely to be found in e-mails, cyber-criminals never stopped adopting new techniques to attract attention of users to their messages.

JS.Gumblar

The six month review from Doctor Web provided information about this severe threat and the high rate of spreading of JS.Gumblar. In July it came to Russia (see the graph below).

As you can see it reached its peak of activity on May 28 with 13.7% of compromised web-sites infected by JS.Gumblar. Now its spreading rate is declining but it still poses threat to web-resources.

FlashBack

Mid-July 2009 was marked by unexpected surge in malicious activities of several modifications of Win32.HLLM.MyDoom which were among most common viruses in the wild in 2004!

Now they are used to carry out DDoS attacks on South Korean and American web-sites. Below you can see the dump of strings constants from the configuration file of a component of the virus that performed a DDoS attack (detected by Dr.Web as DDoS Config).

The number of compromised machines used for attacks has reached dozens of thousands. Attacked web-resources include sites of various governmental institutions of the United States and South Korea: whitehouse.gov, nsa.gov, president.go.kr and many others. Modifications of Win32.HLLM.MyDoom spread mainly in spam attachments and it turns out that the threat of days departed leaved up to the present and managed to become a nuisance in our days.

Mobile botnet

A worm for the mobile platform Symbian Series 60 3rd Edition was discovered in July It spreads as a piece of software offered for downloading on web-sites. Devices infected with the worm send SMS-spam using a contact list found on the device. The body of such an SMS contains intriguing test prompting a user to follow a link that points to the web-site that spreads the virus .

The threat is assigned to the new Symbian.Worm family. Dr.Web anti-viruses detect it as Symbian.Worm.1.

It should also be noted that the worm installer is signed by Symbian Signed portal. This certificate has already been revoked by Symbian. See the corresponding post in the company blog.

Symbian.Worm.1 steals user personal data and sends it to a remote server. The worm can update its message templates using an established internet connection. So it works as a mobile botnet with bots able to communicate with cyber-criminals and provide them with personal information collected on infected devices.

Exploits

In the first two weeks of July a severe “zero day” vulnerability was found in a component of Microsoft DirectX used by Internet Explorer 6 and 7. Vulnerable operating systems include 2000/2003/XP with all released updates installed (including x64 versions of the systems) incorreect procession of a video stream by the msVidCtl.dll component of ActiveX can be used to spread malicious programs from web-sites that cause stack overflow and launch a malicious program on the target machine. All exploits of this vulnerability are members of the Exploit.DirectShow family.

A similar vulnerability was found in an ActiveX component of Office Web Components Spreadsheet. The cause of the vulnerability is incorrect data bounds check in msDataSourceObject(). Under the Dr.Web classification all exploits of this type belong to the Exploit.SpreadSheet family.

Virus-makers didn’t leave the last version of Firefox unnoticed either. A java-script execution error that could damage the memory of the Just-in-Time compiler after its functions returned data has been discovered in the second week of July. All exploits of this type belong to the Exploit.Mozilla family under the Dr.Web classification.

By the end of July a zero-day vulnerability was found in Adobe products (Reader, Acrobat и Flash Player). The authplay.dll file that processed SWF-files turned out to be vulnerable. The vulnerability can be exploited when one opens a special PDF-document or simply visits malicious web-sites that exploit the vulnerability. All detected malicious PDF files are included in the Exploit.PDF family. As of the review date the vulnerability has not been closed.

All vulnerabilities listed above are used by cyber-criminals to spread malware from bogus web-sites.

Security updates closing all the vulnerabilities are already available. Doctor Web strongly recommends installing updates for corresponding applications.

Win32.HLLW.Facebook worm in Twitter

July also saw increased activity of Win32.HLLW.Facebook (Koobface) in Twitter.

Creators of the social networking web-site posted a corresponding warning in their blog.

Doctor Web virus analysts found out that there were few differences between modifications Win32.HLLW.Facebook and they all had the same basic functions. This allowed Doctor Web to ensure reliable detection of variations of Win32.HLLW.Facebook using Origins Tracing. Now most new modifications of the malicious program are detected as Win32.HLLW.Facebook.origin.

Trojan.Winlock

Trojan horses that block access to the desktop in Windows were also found in abundance in the wild. Yet again Trojans disguised as anti-viruses came into the spotlight.

Mail viruses and phishing

It has already been mentioned that few cases of spreading malware via e-mail were registered in July. At the same time the number of spam messages promoting health-care products has increased. Spammers also made their ads available to a wide audience using Google Groups, Yahoo Groups, LiveJournal services.

IRC.Flood.702 spread as an e-card from an ICQ user turned out to be the only malicious program distributed using spam messages.

The death of Michael Jackson also was a too notable event for cyber-criminals not to take advantage of. Messages supposedly containing exclusive information about this event provided would-be-victims with a link to a web-site spreading Trojan.PWS.Panda.122.

BAT.Hosts malicious programs were offered to users as e-cards. Such programs added several strings to the hosts file so a user willing to visit certain web-sites was redirected to phishing resources target customers of Spanish banks. Messages informing users about an “e-card” were also in Spanish.

Traditionally targets of phishing attacks also included eBay users and customers that use the America Online banking system. Customers of Comerica Bank, Ally Bank and USAA also became victims of phishing attacks in July.

Viruses detected in e-mail traffic in July

 01.07.2009 00:00 - 31.07.2009 00:00  
1 Win32.HLLM.Netsky.35328 8166826 (22.65%)
2 Win32.HLLM.Beagle 5909675 (16.39%)
3 Trojan.DownLoad.36339 5504479 (15.27%)
4 Trojan.PWS.Panda.122 2103096 (5.83%)
5 Win32.HLLM.MyDoom.based 1982009 (5.50%)
6 Trojan.Botnetlog.9 1813173 (5.03%)
7 Win32.HLLM.MyDoom.33808 1418521 (3.93%)
8 Trojan.MulDrop.19648 1369527 (3.80%)
9 Win32.HLLM.MyDoom.44 1071356 (2.97%)
10 Win32.HLLM.Netsky 742919 (2.06%)
11 Win32.HLLM.Beagle.32768 722449 (2.00%)
12 Trojan.MulDrop.13408 658883 (1.83%)
13 Win32.HLLM.Perf 587196 (1.63%)
14 Win32.HLLM.MyDoom.49 561190 (1.56%)
15 Win32.HLLM.Beagle.27136 476340 (1.32%)
16 Win32.HLLM.Netsky.based 444932 (1.23%)
17 Exploit.IframeBO 443541 (1.23%)
18 Exploit.IFrame.43 360002 (1.00%)
19 Trojan.PWS.Panda.114 335392 (0.93%)
20 W97M.Dig 238968 (0.66%)
Total scanned:137,012,732,015
Infected:36,051,605 (0.0263%)

Viruses detected on user machines in July

 01.07.2009 00:00 - 31.07.2009 00:00  
1 Trojan.DownLoad.36339 2503920 (10.23%)
2 Win32.HLLM.Beagle 2334712 (9.54%)
3 Trojan.WinSpy.176 1304339 (5.33%)
4 Win32.Virut.14 1171115 (4.78%)
5 Win32.HLLW.Gavir.ini 1163586 (4.75%)
6 Win32.HLLM.Netsky.35328 1027107 (4.20%)
7 Trojan.WinSpy.180 971590 (3.97%)
8 Win32.HLLM.MyDoom.49 899655 (3.68%)
9 Trojan.MulDrop.16727 799252 (3.27%)
10 Trojan.PWS.Panda.122 666798 (2.72%)
11 Trojan.Botnetlog.9 587117 (2.40%)
12 Win32.HLLW.Shadow.based 584087 (2.39%)
13 Trojan.WinSpy.160 513468 (2.10%)
14 Win32.HLLM.MyDoom.33808 494072 (2.02%)
15 Win32.Sector.17 383420 (1.57%)
16 Win32.Alman 381582 (1.56%)
17 DDoS.Kardraw 379553 (1.55%)
18 Win32.HLLM.Netsky.based 343624 (1.40%)
19 W97M.Hana 283978 (1.16%)
20 Win32.HLLW.Autoruner.5555 267185 (1.09%)
Total scanned:210,224,776,255
Infected:24,478,202 (0.0116%)

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2019

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040