Tag Archives: Malware

Skype worm reloaded  

skype scam

Skype worms are not exactly new anymore (unfortunately).

Scenario is simply: someone on your friends list got infected and is now sending you a link to a ‘funny image’ or pictures of you. In this case, you are being baited by a video of you. Let’s just hope it’s nothing embarrassing ;)

skype worm

Lol! Seems like there’s a cool new video of you going around.

When visiting the (totally not malicious looking) link, you get a video, but apparently you need to download a plugin first:

malicious link

When you click on Install plugin… a new file called ‘setup.exe’ gets downloaded. It’s actually simply a self-extracting archive which contains a file named: ‘setup_BorderlineRunner_142342569355180.exe’

When running the setup.exe file:

skypefall setup

It almost seems like we’re installing legitimate software, SkypeFall version 1.0. Almost.

Clicking Next, Next, Next in the setup wizard, nothing much seems to be happening, but in the background there’s quite a lot going on:

skype setup wizard

A new file called ‘SkypeFall’ is dropped and a new DLL is being registered. Afterwards, two new processes are now active in memory: SkypeFall.exe and rundll32.exe, in which the latter is actually running the DLL BorderlineRunner.dll.

Files are being created in both respectively %programfiles%BorderlineRunner and %appdata%SkypeFall. A new service is also registered:
HKLMSystemCurrentControlSetServices6b57ae94

Afterwards you’ll spam all your friends with the same message as well, following the pattern:
skype scam

 

We detect this malware as:

W32/Skyper.A.worm

IOCs

Domains:

hxxp://24onlineskyvideo.info

hxxp://24videotur.in.ua

hxxp://deepskype.net

hxxp://factorygood.net

hxxp://ironskype.net

hxxp://letitskype.info

hxxp://letskype.net

hxxp://popskypevideo.net

hxxp://popvideoskype.com

hxxp://popvideoskype.info

hxxp://popvideoskype.net

hxxp://skypepopvideo.net

hxxp://skypepopvideo.net

hxxp://skyvideo24.in.ua

hxxp://skyvideo24online.in.ua

hxxp://skyvideo24online.ru

hxxp://skyvideotape.in.ua

hxxp://skyvideotape.ru

hxxp://someskype.com

hxxp://someskype.net

hxxp://techine.info

hxxp://techine.net

hxxp://videosk.in.ua

hxxp://videosk.info

hxxp://videoskype.ru

hxxp://videoskype24.ru

hxxp://videoss.in.ua

Hashes (SHA1):

b6f690849e9ed71b3f956078934da5ed88887aa3

42c685ac60555beaacd5e07d5234a6600845e208

dfb9bfb274e9df857bb0fae02ba711e62a2a9eb6

726db7f1c956db8c5e94d21558cbbe650b949b7e

How to avoid the malware W32/Skyper.A.worm

  • Never click on unknown links, especially when a friend sends you a generic text saying there are pictures or videos of you going around. If you’re really curious, ask them first what’s it about. Better be safe than sorry.
  • Don’t be fooled by known icons or “legit” file descriptions, this can easily be altered.
  • Even if you clicked the link and you’re not suspicious, you should be when a file is downloaded and no pictures are shown, but just an EXE file.

The post Skype worm reloaded   appeared first on MediaCenter Panda Security.

Malvertising is bad for everyone but cybercriminals

One rotten malvertisement not only ruins the bunch, but can damage your SMB's reputation.

One rotten malvertisement not only ruins the bunch, but can damage your SMB’s reputation.

Malvertising, sounds like bad advertising right? It is bad advertising, but it doesn’t necessarily include a corny jingle or mascot. Malvertising is short for malicious advertising and is a tactic cybercriminals use to spread malware by placing malicious ads on legitimate websites. Major sites like Reuters, Yahoo, and Youtube have all fallen victim to malvertising in the past.

How can consumers and SMBs protect themselves from malvertising?

Malvertising puts both website visitors and businesses at great risk. Site visitors can get infected with malware via malvertising that either abuses their system or steals personal data, while businesses’ reputations can be tarnished if they host malvertisments. Even businesses that pay for their ads to be displayed on sites can suffer financial loss through some forms of malvertising because it can displace your own ads for the malicious ones.

To protect themselves, small and medium sized businesses should make sure they use the latest, updated version of their advertisement system, use strong passwords to avoid a dictionary attack and use free Avast for Business to discover and delete malicious scripts on their servers. Consumers should also keep their software updated and make sure they use an antivirus solution that will protect them from malicious files that could turn their PC into a robot, resulting in a slowed down system and potential privacy issues. Avast users can run Software Updater to help them identify outdated software.

How does malvertising work?

Businesses use ad systems to place and manage ads on their websites, which help them monetize. Ad systems can, however, contain vulnerabilities. Vulnerabilities in general are a dream come true for cybercriminals because vulnerabilities make their “jobs” much easier and vulnerabilities in ad systems are no exception. Cybercriminals can take advantage of ad system vulnerabilities to distribute malicious ads via otherwise harmless and difficult to hack websites.

Why cybercriminals like malvertising

Cybercriminals fancy malvertising because it is a fairly simple way for them to trick website visitors into clicking on their malicious ads. Cybercriminals have high success rates with malvertising, because most people don’t expect normal looking ads that are displayed on websites they trust to be malicious. Targeting well-visited websites, not only raises the odds of ad clicks, but this also allows cybercriminals to target specific regions and audiences they normally wouldn’t be able to reach very easily. Another reason why malvertising is attractive to cybercriminals is because it can often go unnoticed, as the malicious code is not hosted in the website where the ad is being displayed.

Examples of malvertising

An example of an ad system platform with a rich history of vulnerabilities is the Revive Adserver platform, formerly known as OpenX. In the past attackers could obtain administrator credentials to the platform via an SQL injection. The attackers would then upload a backdoor Trojan and tools for server control. As a result, they were able to modify advertising banners, which redirected site visitors to a website with an exploit pack. If the victim ran outdated software, the software would download and execute malicious code.

Another malware family Avast has seen in the wild and reported on that spread via malvertising was Win32/64:Blackbeard. Blackbeard was an ad fraud / click fraud family that mainly targeted the United States. According to our telemetry, Blackbeard infected hundreds of new victims daily. Blackbeard used the victim’s computer as a robot, displaying online advertisements and clicking on them without the victim’s knowledge. This resulted in income for botnet operators and a loss for businesses paying to have their ads displayed and clicked.

Mandarin Oriental Confirms Data Breach at U.S., European Hotels

The Mandarin Oriental luxury hotel chain is investigating a data breach that affects credit cards used in an “isolated number” of its hotels in the United States and Europe. Company officials said that the attack involved “undetectable” malware on some of its systems and emphasized that only credit card data, and no other personal information, […]