New TDL4 strain very successful in hiding from AV

October 7, 2012

Last month Damballa stirred up the security community with the discovery of a new iteration of the notorious TDL4 rootkit. This rootkit is known for infecting the Master Boot Record (MBR) to gain control over everything that runs on the computer, making itself invisible for antivirus products and pretty hard to remove. The malware is also known as the ‘indestructible’ botnet and Damballa reported that this new variant already infected 46 of the Fortune 500 companies as well as government agencies and ISP networks.

Damballa stumbled upon it thanks to their network behavioral analysis software, which detected the generated domain names that this new TDL4 variant apparently uses for command-and-control communication. Since Damballa could only determine the existence of the new malware by looking for domain fluxing, they concluded that no binary samples of the new malware have been identified and categorized by commercial antivirus products operating at the host or network levels. But HitmanPro is not your average antivirus.

Sst
With all the new stuff we are working on in our office we haven’t really got around to generate our monthly Malware Prevalence Top 25, a list of malware families that HitmanPro encounters on computers protected by up-to-date commercial antivirus products.

As you can see from the August and September lists we posted a few hours ago, Sst – also known as Maxss, a modification of the TDL4 strain – is indeed on the rise, big time.

In just 2 months it reached #2 position! This means that commercial antivirus products are unable to detect, let alone, remove this malware.

Volume Boot Record (VBR)
This new variant is known as Sst.c. It is capable of infecting the Volume Boot Record (VBR) – which is even more challenging for commercial antivirus programs.

So we can confirm that Sst.c is most prevalent and gained a new trick: it infects the Volume Boot Record.

We will post more information on Sst.c when it becomes available.


Banking Trojan keeps hitting the Dutch hard

September 8, 2012

Two days ago, Thursday September 6th, the website of the popular Dutch newspaper Telegraaf.nl was treating its visitors on zero-day malware. Telegraaf.nl is ranked #10 on the list of most popular websites in The Netherlands. Even though the media kept using Telegraaf.nl as the origin of the attack, technically it was caused by a compromised website of a Dutch online marketing company that handles newsletters and email marketing activities for Telegraaf.nl. This online marketing company handles online activities for other well-known Dutch companies too, including some non-profit organizations.

More Dutch websites compromised
To not discredit this relatively small company, their name was deliberately kept under wraps and everybody used Telegraaf.nl when referring to the Thursday outbreak. But according to our research, it wasn’t just this small marketing company that was involved in this specific attack-vector that day. We’ve seen other Dutch compromised websites (that were running on vulnerable versions of the Joomla CMS) with an iframe pointing to the exact same attack site. This attack site was located in Denmark and was hosted on a .com domain registered to a Dutch citizen (this legitimate website was compromised by the attackers and turned into an attack site).

Since the site is hosted in Denmark, you can imagine that it takes a bit more time to take down an attack site hosted in a country other than The Netherlands – it requires international cooperation. Thanks to efforts of others, like the Dutch National Cyber Security Centre (NCSC), the attack page in Denmark was suspended on Friday afternoon.

RedKit Exploit Kit
The attack site was hosting a counter.php which was actually the RedKit exploit kit. One of RedKit’s noticeable features is that it can generate and rotate attack URLs every hour. These URLs point to other compromised websites which makes it difficult to reliably block RedKit’s URLs. The exploit kit uses HTTP response status code 302 to redirect the browser to immediately open the actual attack URL.

To defend itself against malware researchers RedKit is equipped with new anti-forensic features.

AV-Test
Another important feature of this exploit kit is that it allows the attackers to upload an executable (malware) and test it against 37 different antivirus solutions to optimize attacks and ensure results:


Image by SpiderLabs

CVE-2012-4681
To infect computers, this exploit kit abuses a recently discovered vulnerability in Java, registered under CVE-2012-4681. This vulnerability affects Java 7 Update 6 (or older) and Java 6 Update 34 (or older). Since this vulnerability was patched by Oracle just days ago, and knowing that the cybercriminals using RedKit optimized their malware to bypass AV protection, not many computers could withstand this attack.

Below an overview of the malware that HitmanPro encountered on systems that were infected by this attack (the detection ratio was determined using VirusTotal at time of the initial attack):

45% of the affected computers by this attack were infected with the Citadel malware. And the other malware are also designed to steal and generate money.

We were able to identify this initially unknown malware by correlating the timestamp of the infection with that of the initial downloader on the victim machines (the downloader installed the unknown malware within 3 minutes). SHA-256 hashes:

Downloader
8AEA345D4CF97163C60E73AFC7A5B83B4173B3BFD3BF20C37106F1ABFD75834F

Citadel
FA340A57E957F728960B2F5CE53A6FA3463DA45D0AC0B0661AFD1D6D6C346B7B

ZeroAccess
B589605757666883E3C98D1EB2714B5135D7F218D47591DB9EB01FB59BE714A0

Live Security Platinum
3B1FA7D912E968D091A336922932173E5977D9D67F2EA96AC77408CEE95331D5

Note: The Citadel malware is a descendant of the Zeus banking Trojan and re-encrypts itself each time it infects a victim, making each infection unique.

The Dutch government issued an initial warning about the fake antivirus. But after a few hours we could see that it was not the fake antivirus people should’ve been worried about: it’s the Citadel banking Trojan that affected most systems. Contrary to the fake antivirus, which is very visible and popping up on people’s screens, the Citadel banking Trojan is specifically designed to be invisible, for both users and antivirus programs.

HitmanPro detects these malware either through behavioral analysis and/or signature detection. It will also thoroughly remove these infections and repair the (for most AV difficult to fix) services.exe. More about that in our blog ZeroAccess – From Rootkit to Nasty Infection.

Image: HitmanPro detecting Live Security Platinum, ZeroAccess and Citadel malware

Citadel leading the Dutch Malware Prevalence Top 25
I’d also like to refer to July’s top 25 of prevalent malware where, in The Netherlands, the Citadel banking Trojan ranks #1. FakeAV and ZeroAccess rank #2 and #5 respectively. World-wide, the Zeus family (where Citadel is part of) ranks #6.

Thank You
I would like to thank the Dutch National Cyber Security Centre (NCSC) for providing us information during the initial research.


Win 8 Security System and its Rootkit

August 31, 2012

Rogue security software (aka FakeAV or Fake Antivirus) is a form of Internet fraud using malicious software (malware) that deceives or misleads users into paying money for fake or simulated removal of malware. Typically these programs do not have a virus definition database nor a virus scan engine. All of the processes of a security program are imitated to scare victims into believing that their computers are infected with critical risk malware and viruses.

Since 2008 FakeAV is one of the most common malware families that HitmanPro finds on computers protected by an up-to-date antivirus program. The reason for this is that security vendors have a hard time keeping up with the cybercriminals who obfuscate and release new versions and variants of their annoying creations almost every day. Each iteration also has a deceiving name like Security Shield and Live Security Platinum. And to further lure victims into paying money, most rogue security software protect themselves by preventing legitimate programs from starting – this includes productivity software, internet security software and rescue tools. So you can imagine why FakeAV still takes the #1 position on our Malware Prevalence Top 25 month after month.

Rootkit
The reason for writing this article is that we found a new FakeAV which takes a different approach of deceiving and frustrating its victims. This new FakeAV is called Win 8 Security System:

Unlike its predecessors this FakeAV comes with a special rootkit driver which monitors and manipulates the operating system, taking control of every other process and program on the computer. One of the main purposes of the rootkit is to repair the FakeAV program (make it stick to the machine) and to make removal complicated.

The recognition of the rootkit driver is currently very low, only 1 out of 42 renowned anti-virus programs are capable of identifying this rootkit:

The rootkit driver is installed in the Windows drivers folder and has a random name, e.g. C:\Windows\system32\drivers\51991c15f7a6834.sys

64-bit Driver
The malware installs a different driver on computers running 64-bit Windows and disables 64-bit kernel-mode driver signing on these machines. Nonetheless, the cybercriminals went an extra mile by self-signing it with a certificate. Note the validity period, which starts on August 30 (yesterday):

Fake Action Center
The malware shows a fake Action Center, telling the victim the computer is not properly protected against viruses and spyware. When you want to open the real Action Center from the Control Panel, the malware will open the fake one instead:

Browser Hijacker
FakeAV often configures the proxy settings of your computer to intercept web browsing. This malware is different and uses its rootkit to hijack Internet Explorer and Google Chrome to display fake security warning messages when you try to browse the Internet:


Shortcuts
Interestingly, shortcuts that belong to the malware (created on the Start Menu and on the Desktop) all link to the Windows command-line registry editior reg.exe. When the victim clicks on, for example, the Buy Win 8 Security System shortcut, a harmless registry entry is created, which is monitored by the rootkit.

  • Target: C:\WINDOWS\system32\reg.exe add “HKCU\SOFTWARE\Microsoft\Windows NT” /v FrameworkBuild /t REG_DWORD /d 0 /f

When this registry value is accessed (when you click on the shortcut), the rootkit is triggered and opens the shopping cart:

As you can see, for security software this FakeAV is pretty expensive. And if you pay, you have not only paid 100 bucks for fake software, you also submitted your credit card details to the cybercriminals.

Domains
When you look at the web traffic when the shopping cart opens, you can see some other interesting things:

The first site that is accessed is win8sec.com; the malware added this domain as a trusted domain to your computer upon installation. Next it communicates with the http://www.superantispyware.com domain, which belongs to a known legitimate anti-spyware program. If you compare the two websites you can see that win8sec.com is a partial copy of superantispyware.com:

When you lookup the win8sec.com domain record you can discover that it was registered not too long ago, on August 18, 2012 (the registrant details are fake):

The win8sec.com domain currently points to IP address 31.184.244.59. This address currently resides in the United Arab Emirates.

Solution
At time of this blog post, there is currently no anti-virus, anti-spyware or anti-malware tool that we know of that is capable of removing this malware completely. So some security forums are offering a comprehensive step-by-step tutorial, involving the use of multiple tools, to handle this infection. But many forget the rootkit component.

In the meantime, you can use HitmanPro (and the free license that comes with it) to thoroughly and conveniently remove the FakeAV program and its rootkit component. A screenshot of HitmanPro detecting this malware on a 64-bit computer:

Also, if you are affected by this malware, it is very likely that another malicious program was responsible for installing this FakeAV on your machine and is currently still hiding. You can also use HitmanPro to reveal and remove this hidden malware.


Joint Strike Force against Dorifel

August 11, 2012

The computer virus Dorifel became the past three days a very prominent news item as it was on a rampage, infecting as many computers as possible on both government and private networks. IT personnel were stressed out since there were next to no virus signatures to detect the malware.

The inconvenience felt by the general public grew fast as many town’s civil services, like the issuing of passports, had to be taken offline for damage control: Dorifel had encrypted most Excel and Word documents and converted them into executable files.

The result was that many government staff had to blow the dust of the old fashioned typewriters again as they were asked to leave their computers switched off in an attempt to stop the outbreak in its tracks.


Photo by Marcel van Hoorn (ANP)

The creativity of cybercriminals is endless and they do their utmost to stay hidden, bypass antivirus protection, slow down malware research and do something new. Knowing that most antivirus products will first focus on malware blocking only, we figured at the start of the outbreak that there will be no readily available solution soon to recover the millions of affected documents (which prolongs the exposure of sensitive data to the cybercriminals).

Teaming Up with Emsisoft
While we were investigating the outbreak, we also spoke with Fabian Wosar of Emsisoft who was immediately keen to help. He recently created tooling to combat the ACCDFISA and Reveton ransomware families and conveniently had a few boiler plate functions laying around to speed up development of a dedicated remediation tool.

We immediately setup an extra examination environment in our office in Hengelo for Fabian to remotely work on with us, gathered malicious objects and affected documents and started to analyze the malware’s code and behaviors. The task was to find out how the seized documents were encrypted, if there was a way to recover them and, if possible, create a special tool that people can use to recover their documents.

Working Around The Clock
After working from Wednesday evening into Thursday morning on August 9th, Fabian was ready to offer everybody a free to use decryption tool which is available from our special support page: http://www.surfright.com/support/dorifel-decrypter

From this spot we would again like to thank Fabian Wosar for working with us on such short notice and helping everybody, especially the Dutch people, in limiting the effects of this attack.

To continue, we would like to share some interesting details that we encountered using the images below.


Image: Word, Excel and application files are automatically altered and renamed by the Dorifel malware. Notice the ? which is in fact unicode character 202E (aka RTLO right-to-left-override character) which causes the infected file to show up in Windows as ‘Contractrcs.doc’ to fool users the file is still a document.


Image: The encrypted ‘documents’ contains movie phrases and references to TV shows.


Image: The +++scarface+++ marker indicating the start of the encrypted data, which represents the original document.


Image: The pseudo code of the encryption/decryption loop.


Image: The assembly code of the encryption/decryption loop.


Image: Dorifel communicating on the network. Notice it queries for a local machine named KASPERSKY. More important, notice the internet traffic with the pin= parameter, where Dorifel tries get additional payload. Since it first tries to connect to Microsoft’s Update Service (which is hardcoded in the malware) we think that the attackers were also planning to redirect Windows update traffic. The domain reslove-dns.com is currently sinkholed.


Image: Dorifel connecting to the forum.4game.com website for Command & Control information.


Image: Every 1500 seconds Dorifel is retrieving a seemingly harmless ‘Breaking Bad’ season 5 poster (jpeg).


Image: The ‘Breaking Bad’ jpeg image contains hidden encoded Command & Control data. Dorifel stores it in a .dat file in its own folder under &appdata%, e.g. C:\Documents and Settings\User\Application Data\S4428M\G9D8Z3.exe.dat


Image: Small extract from our database where our HitmanPro software was used to rescue AV protected computers that were infected by Dorifel. The table shows that many machines also had Zeus/Zbot/Citadel Trojans, for weeks! Note: user 4624107 had an expired license of our software, which is why the same malware was detected twice.


The Dorifel outbreak was only a symptom. But what is the real problem?

August 10, 2012

Earlier this week, government, public sector and networks of private companies were hit hard by a new wave of crypto malware named Trojan-Dropper.Win32.Dorifel. Computers were shut down and the old-fashioned type writers that were gathering dust in the basement reappeared in the work place. For a moment I even thought this was funny.

The Dorifel Trojan scans network shares, local drives and USB connected drives for executables and Microsoft Office (Word and Excel) documents. Documents and programs were replaced with a new executable file that has the .scr file extension. Currently, most affected users will not notice anything since the ‘documents’ open as usual. It looks like the malware is currently only interested in propagating itself to as many machines as possible. But it is not unlikely that the attackers will later start blocking the ‘documents’ and requesting a ransom fee for unblocking them.

This is bad news for the organizations that were hit. But what’s even worse is that the Trojan entered the networks through a variant of the Zeus/Zbot banking Trojan called Citadel. This means that this Trojan was already present on one or more computers inside the network for days, may-be weeks. In other words: the malware could already be snooping all electronic communication inside the organization, including stealing passwords of critical infrastructure, copying confidential documents, social security numbers, passport details, etc. without anyone (or anything) noticing (!)

Not being able to use your computer for a while, while system administrators are shutting them down, cleaning them and bringing them back into the network is very inconvenient. But it is even more worrysome that computers and networks have been infected for a much longer period without anyone noticing.


Parental Controls affect DNSChanger Check-Up Sites

June 29, 2012

The DNSChanger test that Google, Facebook and the many DNS-OK sites perform do not give the correct results when the computer uses a remote web-filter (or web-proxy) from e.g. their Internet access provider.

In order to explain what causes this, we first need to recap a little of what we wrote earlier this week.

In November 2011, after a two-year FBI probe called Operation Ghost Click, six Estonian nationals were arrested on charges of fraud. They infected computers worldwide with malware called DNSChanger. In conjunction with the Estonian police, the FBI seized the servers used by the cybercriminals but were kept online so as to not disrupt the Web activities of those infected. If the FBI had merely shut down the rogue servers, many of those infected wouldn’t have been able to access the Web at all. That means no websites, no e-mail, and no Facebook.

The DNS Changer Working Group (DCWG), that’s been maintaining the FBI servers since their seizure, has created a website http://www.dns-ok.us that allows you to check if your computer is infected. People are encouraged to check their devices by visiting this website to see if their computer is infected. If infected, they’re then directed to information on how to remove the malware.

It is estimated that over half of the users with an infected computer are not English speaking, so Computer Emergency Response Teams (CERTs, aka CSIRTs) active in many countries setup a localized version of the DNS-OK site. Using articles in local newspapers, people were encouraged to check their systems. To reach even more people, Google and Facebook also started notifying victims of the DNSChanger malware.

Millions of Internet users checked their devices using one of the many DNS-OK websites or through Google or Facebook. And with good results: a tremendous amount of devices have been cleaned till date. But still, despite great efforts, around 300,000 devices are still not cleaned. How come? Don’t these people use Google or Facebook?

False sense of security
The DNS test that Google, Facebook and the many DNS-OK sites perform do not give the correct results when the computer uses a remote web-filter (or web-proxy) from e.g. their Internet access provider. While users expect their own DNS settings to be checked, a remote web-filter will cause the DNS-OK website to check the DNS settings of the filter instead. This means that the DNS-OK site will show green even though the user’s computer could still be infected, giving him or her a false sense of security.

Security as a Service
For example, many ADSL Internet contracts include network-based web-filtering services. These remote web-filters act as an intermediary and retrieves and evaluates webpages and downloads before sending it to the computer of the user. This service, also known as Security as a Service (or SaaS), doesn’t involve any software setup or action from the end-user. It limits children from accessing inappropriate content (parental control), controls the download of certain files (e.g. spyware, pirated software) and optionally filters unwanted web advertising from web content. All good news. But on the other hand this filter prevents accurate DNS testing on any of the DNS-OK websites and affects the check performed by Google and Facebook as well.


Figure 1: The DNSChanger Check-Up Site (www.dns-ok.us) says the infected computer is not affected, while in fact it is.


Figure 2: A name lookup reveals the problem. The remote web-filter returns the wrong IP address.


Figure 3: The same infected computer on a connection without remote web-filtering: correct response.

Because the DCWG is unable to count the infected computers that use a network-based security service, the actual amount of infected computers is very likely higher than the current 300,000.

What to do: check again, manually
The Internet provider cannot be blamed for offering Security as a Service. So if you use an “in-the-cloud” remote web-filter, web or DNS-proxy or safe gateway from e.g. your Internet access provider, and you got a green OK on e.g. www.dns-ok.us: your computer might still be infected. So you might want to check out the Fix page over at DCWG again. Because to prevent losing web and/or e-mail access on July 9, you should follow these two steps:

  1. Check your DNS settings manually, because www.dns-ok.us (and other test sites) cannot perform a reliable test in your situation.
  2. Use a second opinion antivirus program to scan your computer for the Alureon rootkit (aka TDSS, Olmarik, TDL4) that distributed the DNSChanger malware. Currently, Alureon ranks #4 on our May 2012 malware prevalence list since it successfully hides from antivirus software since 2009. So checking your computer with your regular antivirus software will not be sufficient.

About the DNSChanger malware
The DNSChanger Trojan changed the DNS settings on the computer, redirecting websites entered by the user to other unsolicited, and potentially illegal sites. If personal information was entered on these websites, it could’ve lead to identity theft.


275,000 computers lose Internet access on July 9

June 27, 2012

On many computers deemed safe and protected by up-to-date antivirus software, the Alureon rootkit is still one of the most prevalent infections that HitmanPro encounters. And over the last few years the Alureon rootkit (aka TDSS, TDL and Olmarik) has evolved and been used for all kinds of different attacks. From drive-by downloads to targeted attacks that aim only a specific group of persons. One of its lesser known jobs was to distribute the DNSChanger Trojan.

Beginning 2007, the DNSChanger Trojan seizes web traffic by changing the DNS (Domain Name System) settings on an infected computer. As a result, victims are diverted to malicious websites instead of the requested website. In other words, once the Trojan has altered the DNS settings, DNS queries will be redirected to the attacker-controlled DNS servers, which forces the user to visit malicious websites where scammers often earned millions of dollars in affiliate and referral fees as well.

FBI
On November 8, 2011 the FBI arrested six Estonian nationals who were operating over a hundred malicious DNS servers in data centers in Estonia, New York and Chicago. Along with these arrests, the servers involved with the DNSChanger malware were seized. Since machines with modified DNS settings would be unable to access the Internet once the malicious DNS servers went offline, the FBI obtained a court order that allowed the non-profit Internet Systems Consortium (ISC) to set up alternate DNS servers to temporarily replace the malicious servers. These servers were intended to give people time to clean up the infection. The court order was originally set to expire March 8 this year, but prosecutors filed for an extension because over 400,000 computers still remained infected. The new deadline for getting cleaned up and averting the Internet blackout is now July 9, 2012.

DCWG, Google, Facebook, CloudFlare
To remediate users and help the FBI with the alternate DNS servers, the DNS Changer Working Group (DCWG) was created. The DCWG is an ad hoc group of subject matter experts, and includes members from organizations such as Georgia Tech, Internet Systems Consortium, Mandiant, National Cyber-Forensics and Training Alliance, Neustar, Spamhaus, Team Cymru, Trend Micro, and the University of Alabama at Birmingham.

To aid the slow remediation rate, Google started notifying affected users in May 2012, showing warnings via a special message that appears at the top of the Google search results page for users with affected devices. Also, 11,000 websites enabled the CloudFlare Visitor DNSChanger Detector which shows infected visitors a warning banner to help them remove the malware and remain online. And this month, Facebook joined Google in warning victims among its 900 million users.



Recover from a DNSChanger infection

The past few months, HitmanPro has helped tens of thousands of people restoring their DNS settings and remove the DNSChanger Trojan and the TDSS rootkit from their computers. As shown in the graph below, the campaigns by Google and Facebook played a significant role in informing users that were infected and pointing them to a solution:

Italy
Below, the latest Top 5 DNSChanger Infections by Country (June 11, 2012). Many computers in Italy are still affected by DNSChanger:

Head over to http://www.dns-ok.us and check your Windows and Mac computers for the DNSChanger Trojan. Given that on July 9 you might not get the chance to do this, you should check your computers as soon as possible.


Follow

Get every new post delivered to your Inbox.

Join 36 other followers