Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to the news list

March 2014 virus activity review from Doctor Web

April 2, 2014

During the first month of spring, Doctor Web's virus analysts added numerous definitions to the company’s virus databases. In early March, for example, the analysts discovered a Trojan that infects ATMs, and, in the middle of the month, Doctor Web reported on a malignant program that was compromising Wi-Fi routers. March also saw a large number of previously unknown Trojans for Android being identified.

Viruses

According to data collected in March 2014 with Dr.Web CureIt!, Trojan.Packed.24524, which installs adware and riskware in compromised systems, was the most frequent "guest" on user PCs. The advertising Trojans— Trojan.InstallMonster.51 and Trojan.LoadMoney.15 — ranked second and third respectively, with another advertising piece of malware — Trojan.LoadMoney.1 — following close behind. Also detected in March were several Trojan.BPlugprograms. These are implemented as browser plug-ins that display ads in loaded webpages or promote various bogus sites. The twenty Trojans most frequently detected in March by Dr.Web CureIt! are listed in the table below:

NameQuantity%
Trojan.Packed.24524686406.50
Trojan.InstallMonster.51214152.03
Trojan.LoadMoney.15184051.74
Trojan.LoadMoney.1164501.56
Trojan.Siggen5.64541163951.55
Trojan.InstallMonster.61150761.43
Trojan.Triosir.1142571.35
Trojan.DownLoader11.3101125101.18
Trojan.BPlug.28116641.10
Trojan.Packed.2481486460.82
Trojan.Fraudster.52483180.79
Trojan.BPlug.1082890.79
BackDoor.IRC.NgrBot.4280360.76
BackDoor.Maxplus.2479120.75
Trojan.BPlug.1778140.74
Trojan.InstallMonster.3878020.74
Trojan.Hosts.681572480.69
Trojan.MulDrop5.1007869240.66
Trojan.StartPage.5996468890.65
Trojan.Triosir.262370.59

Botnets

The botnet comprised of Windows machines compromised by the file infector Win32.Rmnet.12 has been growing steadily. In March, the average number of bots in its first subnet, which is being monitored by Doctor Web's security researchers, reached 244,430. The second subnet grew somewhat more slowly in March: its average number of bots was 157,343. The number of machines on which Dr.Web software detected Trojan.Rmnet.19 also declined slightly. At the end of March, it reached 2,066—457 fewer PCs than in the previous month.

Meanwhile, the number of Macs infected with the Trojan BackDoor.Flashback.39 fluctuating: in March, the average number of machines in that botnet was 25,912. It should be noted that all the computers that contacted the command and control server in the past month had already been infected earlier.

Other threats in March

In early March, Doctor Web's security researchers reported the discovery of Trojan.Skimer.19, a threat that compromises ATMs.

Once an ATM's OS is infected, Trojan.Skimer.19 monitors EPP (Encrypted Pin Pad) keystrokes for a specific input combination that will help it become activated and then execute whatever command an intruder enters via the EPP. The commands include the following:

  • Save the log files onto the card's chip; decrypt PIN codes.
  • Remove the Trojan library and log files; "cure" the host file; reboot the system (criminals issue commands twice to infected ATMs; both are issued within a ten-second interval).
  • Display statistical information including the number of transactions, banking cards, intercepted encryption keys, etc.

    screen

  • Delete all the log files.
  • Reboot the system.
  • Read the executable from the card's chip to update the Trojan.

More information about Trojan.Skimer.19 can be found in a corresponding publication on Doctor Web's site.

Also in March, Doctor Web's virus analysts examined the program Trojan.Rbrute, which is designed to crack Wi-Fi-router access passwords through brute force attacks and to switch out the DNS server addresses in the settings of these compromised devices. The Trojan can also execute two commands: 1) perform a network scan according to a specified range of IP addresses and 2) mount a dictionary attack. These commands are unrelated and can be performed by the Trojan separately.

screen

Attackers have been using this malware to spread the file infector Win32.Sector. To learn more about how this malicious program operates and spreads, please refer to the corresponding informational material that has been published on our site.

Mobile threats

The first month of spring was stressful for Android. In early March cybercriminals launched the commercial distribution of a new Trojan, dubbed Android.Dendroid.1.origin. This malware, which can be embedded into any harmless Android app, enables attackers to carry out a number of illegal actions on an infected mobile device: intercept calls and SMS messages, get information about the current location of the device, gain access to the phone book and browsing history, activate the device's camera and microphone and send short messages. Android.Dendroid.1.origin is sold on underground hacker forums, which once again indicates that the market for illegal services for the Android is growing.

screen

Android.Backdoor.53.origin was discovered by Doctor Web's security researchers in mid-March. It should be noted that in order to spread this program, the criminals behind it modified Webkey, a legitimate application that lets users control their mobile devices remotely. Unlike the original version, the compromised application doesn't have a GUI and after installation hides its presence in the system by removing its icon from the main screen. When launched, Android.Backdoor.53.origin sends the device's ID to a remote server, signalling that the infection was initiated successfully. Consequently, the intruders can get full control over the device and gain access to the personal data and hardware features.

screenscreen

At month’s end, Doctor Web's analysts discovered an entire group of Android.DownLoader programs primarily targeting devices in China. On compromised mobile devices, these Trojans can download and install other malicious programs, as well as a number of legitimate applications, to generate a profit from the programs’ illegal promotion. These Trojans can be particularly dangerous, because if root access is available in a system, the downloaded programs can be installed without user consent. The malware can also generate a lot of traffic which can result in financial losses for subscribers whose service packages do not include unlimited Internet connectivity. More information about this incident can be found in a related news publication.

screen

Also in March, the definitions for several Trojans that covertly mine some cryptocurrencies were added to the Dr.Web virus database. These malicious programs were distributed by criminals in modified versions of popular applications and sprang into action whenever the infected mobile device was in standby mode. Ultimately, these Trojans can not only significantly shorten battery life, but can also make users uncomfortable due to the increased heat generated by the device's constantly engaged components, activity that may, in turn, adversely affect their lifespan. Furthermore, because these Trojans actively use Internet connections, many subscribers may experience financial losses. Dr.Web for Android detects these threats as members of the Android.CoinMine family.

screenscreenscreen

Compared with the previous month, in March, the number of unwanted SMS messages spreading malicious programs for Android in South Korea increased by 113.3%. In total, Doctor Web's specialists registered 192 incidents involving SMS spam spreading such Trojans. Android.Spy.64.origin (86 incidents), Android.SmsSpy.53.origin (26 incidents), Android.SmsSpy.78.origin (18 incidents), Android.Spy.40.origin (13 incidents) as well as Android.MulDrop.14.origin (12 incidents) and Android.SmsSpy.65.origin (10 incidents).

screen

Malicious files detected in mail traffic in March

 01.03.2014 00:00 - 31.03.2014 23:00 
1Trojan.DownLoad3.281610.75%
2Trojan.PWS.Panda.24010.65%
3Trojan.PWS.Panda.47950.61%
4BackDoor.Andromeda.2670.60%
5Trojan.DownLoader9.401820.57%
6Trojan.Fraudster.7780.56%
7Trojan.PWS.Panda.56760.52%
8Trojan.Oficla.zip0.46%
9Trojan.DownLoader9.392620.44%
10Trojan.Siggen6.111940.41%
11Trojan.PWS.Panda.5470.41%
12Trojan.Inject1.382580.38%
13Trojan.PWS.Stealer.41180.35%
14Trojan.Fraudster.5170.35%
15BackDoor.Kuluoz.40.34%
16Trojan.DownLoader9.395390.34%
17Exploit.Rtf.360.33%
18Win32.HLLM.MyDoom.338080.33%
19Win32.HLLM.Graz0.31%
20Trojan.DownLoader9.447840.29%

Malicious files detected on user computers in March

 01.03.2014 00:00 - 31.03.2014 23:00 
1SCRIPT.Virus1.29%
2Trojan.Packed.245240.62%
3Trojan.InstallMonster.510.61%
4Trojan.Fraudster.5240.54%
5Tool.Skymonk.140.43%
6Trojan.LoadMoney.150.43%
7Adware.NextLive.20.39%
8JS.IFrame.5660.38%
9Adware.OpenCandy.30.35%
10BackDoor.IRC.NgrBot.420.35%
11Adware.Downware.1790.35%
12Adware.OpenCandy.40.34%
13Tool.Unwanted.JS.SMSFraud.260.34%
14Adware.Toolbar.2400.33%
15Adware.Webalta.130.33%
16Adware.Downware.22320.33%
17Tool.Skymonk.170.33%
18Adware.Conduit.330.31%
19JS.Redirector.2090.30%
20Trojan.MulDrop5.100780.30%

Learn more with Dr.Web

Virus statistics Virus descriptions Virus monthly reviews Laboratory-live

Tell us what you think

To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments