July 2, 2013
According to statistics collected by Dr.Web CureIt!, Trojan.Mods.2 was one of the most common threats in June 2013. It accounted for 3.97% of the infection incidents in the past month. This malware redirects users to criminal-owned web pages on which visitors are prompted to enter their phone number and a verification code into the appropriate boxes. By doing so, the victim is subscribed to a certain "information service" for which a regular payment is debited from their account.
The previous modification in the family, namely Trojan.Mods.1, is not far behind. It occupies fourth place at 1.45%, while Trojan.Hosts.6815 (2,94%) and Trojan.DownLoader9.19157 (1,92%) close out the top three. The ten most common threats detected by the curing utility Dr.Web CureIt! on users' computers in June 2013 are listed in the table below:
A new version of the bot Linux.Sshdkit, on which Doctor Web first reported in February 2013, was discovered in June 2013. As of June 27, the botnet created using a previously known version of the Trojan included as few as 42 active bots, with only eight infection incidents involving Linux servers during the last month.
At the same time, infections with the file infector Win32.Rmnet.12 are growing in number. The first viral sub-net, whose command and control server is monitored by Doctor Web's analysts, currently comprises 459,192 bots, while the second includes 613,135 nodes. A graph indicating how newly infected hosts connected to the network in June 2013 is displayed below:
The botnet Win32.Rmnet.16 currently has 4,674 active bots (last month it had 5,220), while only 239 infected computers joined the zombie network in June. The number of desktops, on which malicious modules of Trojan.Rmnet.19 (as dubbed by Dr.Web) were discovered, decreased slightly too. In May the botnet included 20,235 infected PCs, but as of June 27 the number dropped to 15,611. The botnet's growth slowed as well, and can be traced in the diagram below. While 8,447 new joiners registered on the C&C server in May, only 738 infection incidents occurred from June 17-27.
The botnet created with BackDoor.Bulknet.739 grew smaller, too. The hijacking of its C&C server was reported by Doctor Web earlier. If, in May, the network consisted of 17,242 infected computers, in late June, the number of active bots decreased to 16,024. Use the graph below to trace how newcomers registered on the C&C server through June:
The school of Macs infected with a Trojan for Mac OS X BackDoor.Flashback.39 also shrank insignificantly, but this process is not moving as fast as we would like. On June 27 the botnet BackDoor.Flashback.39 had 62,069 infected Macs —3,918 fewer nodes than in May.
The threat of the month
In June, a new Linux.Sshdkit modification joined the family of malicious programs for Linux. Like its predecessor, the updated version is also designed to steal login and passwords from Linux servers. It has been named Linux.Sshdkit.6. In this version of Linux.Sshdkit, attackers made a number of changes in order to make it difficult for virus analysts to intercept stolen passwords. In particular, they changed the routines used by the malware to determine the addresses of the servers to which the malware is to transmit stolen information. Now to calculate the target address, the Trojan uses a text string encrypted with a 128-bit RSA encryption key. The flowchart below illustrates how a C&C server address is generated.
Also changed was the command receipt routine: a special string for which a checksum is verified precedes any command. A more detailed description of this threat can be found in a corresponding review published by Doctor Web.
Another upsurge of encoders
Trojan coders become a scourge for personal computers: Doctor Web's anti-virus laboratory received about 2,800 complaints in connection with these malicious programs over the last three months, and in June the total number of requests exceeded 700. Trojan.Encoder.94 and Trojan.Encoder.225 became the most common encoder versions in the first summer month of 2013. They are distributed primarily by email, so Trojan.Encoder.225 can get into the operating system with a message that has an RTF document attached to it (with the extension .doc); this document exploits a Microsoft Office vulnerability. And, Trojan.Encoder.94 is often downloaded on computers by the malware BackDoor.Poison, which, in turn, is massively distributed in emails with attached files.
Because the workload of Doctor Web's virus laboratory has increased significantly of late, effective June 19, 2013, Doctor Web is helping only registered users of its products to decrypt files compromised by the malware.
The first summer month showed that the theft of personal information, such as logins and passwords, short messages and call history, remains one of the most severe threats to owners of mobile devices. To accomplish these thefts, criminals employ Trojans as well as commercial spyware.
In early summer, the Trojan Android.Tempur.1.origin, designed to steal confidential information from South Korean Android users, was the most prominent mobile threat of this kind. Stolen data includes bank account details, and information about incoming SMS messages and outbound phone calls. The malware was distributed by cybercriminals as part of another program detected by Dr.Web as Android.MulDrop.8.origin, and as a separate apk package. The Trojan Android.Tempur.1.origin is a rather unusual malicious species because, when installed on a mobile device, it imitates the operation of legitimate banking applications and prompts the user to enter their personal information, which is then forwarded to a remote server along with intercepted text messages and information about phone calls.
More information about this threat can be found in a relevant publication on Doctor Web's site.
As for commercial spyware applications, noteworthy species among such programs detected in June include modifications of known Android spyware such as Android.MobileSpy and Android.SpyBubble, a new family Program.Highster, as well as the applications Program.Stealthgenie and Program.Ownspy, which are designed for BlackBerry and iOS, respectively. It is worth noting that Program.Ownspy and similar applications only run on devices where the operation ‘jailbreak’ has been performed (i.e., on devices that can access the file system), so the bulk of mobile Apple product owners are in no danger. Yet the number of people who are using hacked iOS devices is significant, so the spyware can represent a severe threat.
Android.SmsSend programs, which send short messages to premium numbers and sign up subscribers to various chargeable services, are still causing a headache to many Android device users. Signatures for several new modifications of these malicious programs were added to the Dr.Web virus database during the month, and in the second half of June, the company's analysts discovered that the malware Android.SmsSend.465.origin was being distributed by means of advertising messages displayed on a popular news portal.
When users load the site's page on an Android device, they are shown a special banner that prompts them to install a popular game, which is actually a malicious program in disguise. You can read more about this incident in news material published on Doctor Web's site.
Malicious files detected in mail traffic in June
|01.06.2013 00:00 - 28.06.2013 11:00|
Malicious files detected on user computers in June
|01.06.2013 00:00 - 28.06.2013 11:00|
Tell us what you think
You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.