Antivirus firm warns of Microsoft security Trojan horse

Search

Another Day, Another Dollar
Joined
Mar 1, 2002
Messages
42,730
Tokens
computerworld.com

A new campaign by malicious hackers uses a Web site designed to look like Microsoft Corp.'s Windows update page to trick unwitting Internet users into infecting their computers with a Trojan horse remote-access program, according to antivirus experts at Sophos PLC.


The scam uses e-mail messages that appear to come from Microsoft to get recipients to visit a Web page that uploads the malicious program. Using the promise of Windows software patches to distribute malicious code isn't new. However, the latest attacks show that scammers are adopting strategies used by phishers to evade detection by gateway and desktop antivirus programs, said Graham Cluley, senior technology consultant at Sophos

The attack was first detected yesterday in the Sophos laboratory in Vancouver, British Columbia, after it was distributed in a spam campaign. The messages have subject lines like "Update your windows machine" or "Urgent Windows Update," Cluley said.

A link in the body of the e-mail message appears to take users to the Microsoft Windows Update Web site, but it actually forwards them to a Web site operated by the attackers that installs a Trojan horse program called DSNX-05, according to Sophos.

The Web site run by the hackers was registered to an Internet service provider in Toronto, but has since been shut down. The site looked very much like the actual Microsoft Windows Update page and displayed Microsoft's corporate logo. One giveaway that something was amiss was that the URL displayed in the Web browser address bar showed only the Internet Protocol address of the site, instead of the Windows update address, Cluley said.

Sophos doesn't know how many Internet users may have fallen for the ruse, Cluley said.

The method of attack is similar to phishing identity-theft attacks, which have become common in the past year. As with many phishing attacks, gateway antivirus software doesn't detect the scam because there is no malicious code in the e-mail. Desktop antivirus software with spam detection could spot the e-mail, but only if an antispam definition for the attack had been created and the user had updated the antispam definitions for the product, according to Cluley.

Those behind the attack may have been trying to capitalize on anticipation of Microsoft's upcoming software security patch release next Tuesday, he said. Microsoft yesterday said it intends to put out a number of security patches for its software (see story).

"It's such a shame that, just as we're beginning to teach people more about security updates, cybercriminals are exploiting that," Cluley said.

Sophos warned that Microsoft doesn't issue security warnings in the manner used by this attack. E-mail users should be on guard when receiving an unsolicited e-mail that contains an attachment or asks the reader to click a link to a Web page, he said. While the Web page used in the latest attack was disabled, those behind the scam could post the content in a new location and restart the attack, he said. <!--STOPINDEX-->
 

Forum statistics

Threads
1,108,635
Messages
13,453,132
Members
99,426
Latest member
bodyhealthtechofficia
The RX is the sports betting industry's leading information portal for bonuses, picks, and sportsbook reviews. Find the best deals offered by a sportsbook in your state and browse our free picks section.FacebookTwitterInstagramContact Usforum@therx.com