April 30, 2014
According to statistics gathered by Dr.Web CureIt!, in April 2014, Trojan.Packed.24524, which installs unwanted and dubious applications in compromised systems, was most frequently detected on PCs. As in the previous month, Trojan.BPlug programs ranked second and third. Implemented as browser plugins, they advertise dubious websites on loaded web pages. The 20 threats most frequently detected by Dr.Web CureIt! in April 2014 are listed in the table below:
The botnet created by hackers using the file infector Win32.Rmnet.12 is still operational. The first of its two subnets, which are monitored by Doctor Web's virus analysts, experienced a daily average of 165,500 connections being made to it by infected computers, while roughly 13,000 newly infected workstations were joining the botnet each day. The diagram below illustrates how the network expanded:
In the second Win32.Rmnet.12 subnet, on average 270,000 bots were operating daily, and about 12,000 newly infected PCs were joining the network every 24 hours. The second Win32.Rmnet.12 subnet’s growth can be traced in the following diagram:
The number of machines on which Dr.Web anti-virus software has been detecting the malware module Trojan.Rmnet.19 decreased slightly—from 2,066 bots at the end of March to 1,866 in the last days of April.
The number of computers running Mac OS X and infected with BackDoor.Flashback.39 is declining gradually too. Over the past month the botnet shrank by another 30%—from 25,912 at the end of March to the current figure of 18,305 infected Macs.
Other threats in April
In early April, Doctor Web reported the discovery of a multi-component backdoor bootkit dubbed BackDoor.Gootkit.112. For their piece of craftsmanship, the virus writers behind the malware have borrowed bootkit features from programs in the Trojan.Mayachok family, but the attackers introduced significant changes to the source code.
To bypass the UAC and elevate its privileges in an infected system, BackDoor.Gootkit.112 employs a shim (Microsoft Windows Application Compatibility Infrastructure). Overall, the UAC bypass scheme looks as follows:
- The Trojan creates and installs a new fix database (shim);
- It then launches cliconfg.exe with elevated privileges;
- The shim unloads the original process and uses RedirectEXE to launch the Trojan.
The Trojan can execute the following commands:
- Intercept http traffic;
- Inject code into other processes;
- Block specific URLs;
- Take screenshots;
- Acquire the list of running processes;
- Acquire the list of local users and groups;
- End specified processes;
- Execute shell commands;
- Launch executables;
- Auto update.
The second half of April witnessed frequent complaints from Mac OS X users about annoying ads, which they periodically observed on web pages loaded in popular browsers. The cause behind this nuisance is multiple browser extensions that are installed into the system along with some legitimate programs.
One such program is Downlite which can be downloaded on a popular torrent tracker site by clicking on Download. As a result, the user is redirected to another site from which the Downlite installer (Dr.Web Anti-virus identifies it as Trojan.Downlite.1) is downloaded. The executable installs the legitimate application DlLite.app and several browser plugins. Also installed is the application dev.Jack which is designed to control Mozilla Firefox, Google Chrome and Safari. It is detected by Dr.Web anti-virus software as Trojan.Downlite.2. In addition, advertising plugins are bundled with other applications (MacVideoTunes, MediaCenter_XBMC, Popcorn-Time, and VideoPlayer_MPlayerX). The outcome of all these manipulations is that annoying ads of the following types appear in browser windows:
- Underlined keywords; hovering the mouse cursor over such words invokes advertising pop-ups;
- A small window with the Hide Ad button displayed in the bottom left corner;
- Banners on search engine result pages and on popular sites.
More information about this malicious program can be found in a corresponding review published by Doctor Web on its site.
Threats to handhelds
As far as new malware for Android is concerned, April wasn't exceptional—it even delivered several unpleasant surprises. Thus, the emergence of a new modification of the bootkit Android.Oldboot, which gained its notoriety in January 2014, became a major Android security event. The payload of this updated Trojan hardly differs from that of its predecessor: the program's main purpose is to covertly download and install other applications. However, it also incorporates several new features. In particular, when launched, several bootkit components delete the original files and only operate in the device's memory. This can significantly complicate the detection and neutralisation of this threat. Furthermore, to complicate the neutralisation of the updated Android.Oldboot, attackers have resorted to code obfuscation for some of its modules. They have also enhanced it with the ability to delete a number of anti-virus applications.
Google Play didn't go unnoticed by criminals either: several Trojan applications for covert Bitcoin mining appeared in the catalogue in the last month. The discovered Trojans were added to the Dr.Web virus database as Android.CoinMine.1. Concealed in harmless "live wallpaper", they would begin their malicious activities provided the infected mobile device was inactive for a certain period of time.
Similarly to the malicious programs discovered in March, the new Trojan miners could cause not only financial losses because of the substantial consumption of Internet traffic, but also adversely impact the operation of the mobile device itself.
Also in April, attacks involving unwanted SMS messages containing malware download links persisted against South Korean Android users. Doctor Web's security researchers registered 232 such spamming attacks, and the most frequently detected Trojans included Android.Spy.64.origin, Android.SmsBot.75.origin, Android.Spy.40.origin, Android.SmsSpy.78.origin, Android.BankBot.6.origin and Android.SmsSend.685.
Special attention should be paid to Android.SmsBot.75.origin. To spread this program, criminals orchestrated more than 40 spam attacks in which users were notified about an alleged package delivery failure. If the user opened the link found in the SMS, they were redirected to a bogus blog page where they were offered to download an application that is in fact a Trojan capable of stealing confidential information and executing commands sent by criminals. More information about this threat can be found in a publication on Doctor Web's site.
Distributing malware with SMS spam is popular in Russia too. In April such short messages contained a download link for the program Android.SmsSpy.88.origin.
Once the program was installed and launched, it would send some device information to criminals and then stand by for instructions which might include directives to intercept incoming messages, send SMS with specific parameters and forward all inbound phone calls. Thus, Android.SmsSpy.88.origin didn't just generate SMS spam but could also perform espionage activities.
In addition, in April security researchers learned about another Trojan targeting jail-broken devices manufactured by Apple. The malicious program in question is IPhoneOS.PWS.Stealer.1. Discovered on a number of devices in China, it can steal Apple ID information that provides access to most of the company's services, including the App Store, iCloud and others. Thus, the theft of this data could significantly impact the well-being of users.
Malicious files detected in mail traffic in April
|01.04.2014 00:00 - 30.04.2014 14:00|
Malicious files detected on user computers in April
|01.04.2014 00:00 - 30.04.2014 14:00|
Learn more with Dr.Web
Tell us what you think
You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.