Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to the news list

Over one million PCs compromised by Win32.Sector file infector

May 21, 2014

File infectors aren't as common as other types of malicious programs, so Win32.Sector, which is being used by attackers to create an extensive botnet, is attracting particular interest among security researchers. Doctor Web's analysts have examined this malicious program and were able to assess the scale of the infection.

Known to analysts since 2008, Win32.Sector is a complex polymorphic malicious program that can spread on its own (without user intervention) and infect files. Its main function is to download various executables via P2P networks and run them on infected machines. This malicious program can inject its code into running processes, terminate certain anti-viruses and block access to the sites of their respective developers. Win32.Sector can infect files on local and removable disks (in the latter case, it can create the file autorun.inf on removable media) as well as in shared network folders. At present, there are several Win32.Sector modifications, each with a different P2P network communication protocol and different structural features.

By design, Win32.Sector has no control servers; instead it connects with other bots running on infected machines. It determines whether the computer has an external IP address or connects to a network that uses NAT. When launched on an infected computer, Win32.Sector uses an initial list of IP addresses to connect to other bots. If successful, the file infector executes the following commands:

  1. Use a download link to request a configuration file via UDP.
  2. Request plugins (via TCP).
  3. Check for NAT; if unavailable, the bot receives a unique identification number ID (via UDP).
  4. Obtain the IP address of another infected machine to establish a connection (via UDP).

The third command makes the program operate as a router to which other bots (those operating in networks that use NAT and, therefore, have no external IP addresses of their own) connect. The fourth directive enables the file infector to acquire lists of IP addresses from other bots. Doctor Web's security researchers used these two commands to determine the number of infected hosts connected to the botnet and to assess the scale of the infection.

As of May 20, 2014, the Win32.Sector botnet was comprised of 1,197,739 unique bots, 109,783 of which had external IP addresses and could operate routers for other infected hosts. The growth of the botnet can be traced in the graph below:

Win32.Sector botnet growth

On average, about 60,000 infected computers interacted over the botnet on a daily basis. A Win32.Sector botnet activity graph is presented below:

Average daily activity in the Win32.Sector botnet

From a geographical standpoint, the largest number of hosts infected with Win32.Sector are found in —212,401. ranked second (108,770), and ranked third (106,249). In , 15,600 infected computers were identified. Win32.Sector’s geographical spread by country is shown in the illustration below:

Currently several malicious programs are being spread via the Win32.Sector botnet:

All of these threats, including Win32.Sector, are successfully detected and removed by the Dr.Web antivirus, so they pose no threat to computers protected by Doctor Web's software. The company's security researchers will continue to monitor further developments.

Tell us what you think

To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments