Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 42955
  • Total Topics: 16151
  • Online Today: 4651
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 17. April 2010., 07:18:06 »



Zeus spyware Trojan variants have begun using PDF files to package exploits.

Thousands of spammed messages containing exploit-ridden attachments posing as delivery notices from the Royal Mail have been intercepted by net security firm Websense this week.

The PDF attachment contains an embedded executable containing the Zeus payload. Users get a warning before this executable is run, but long experience shows that many user will simply click through such warnings.

Once infected, compromised machines 'phone home' to hacker controlled servers in China.

Other Zeus variants using the same attack strategy also spotted this week come disguised as a billing invoice, warns M86 Security Labs.

Zeus (aka Zbot) is a family of information stealing, customised crimeware tools on sale on the digital underground and widely linked to bank fraud scams. The latest attack is a more sophisticated variant on previous attacks featuring malware-laced email attachments or (more inferquently) drive-by download attacks.

The techniques used by the latest Zeus attacks are similar to the launch embedded executable from PDF security shortcoming of multiple PDF reader packages first explained by security researcher Didier Stevens late last month: http://blog.didierstevens.com/2010/03/29/escape-from-pdf

Websense's advisory, which contains screenshots of the malware-laced spam emails and a detailed explanation of how the attack works, can be found here: http://securitylabs.websense.com/content/Alerts/3593.aspx?cmpid=slalert

(ElReg.)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising