BitDefender Identifies Trojan Capable of Executing Cyber-assaults
Says Security Expert Loredana Botezatu at BitDefender, the company has lately encountered the malware masquerading like one routine update vis-à-vis Java. On carefully investigating this file, it discloses how one cautiously designed malware item, which's highly viral in character, is capable of being utilized as a robust device for triggering DDoS assaults, the expert notes. Softpedia.com published this on July 20, 2011.
Apparently, the malware sample that BitDefender identifies as Backdoor.IRCBot.ADEQ is not only being spread via legitimate websites that have been compromised, but it can also use a wide range of techniques for disseminating itself.
These techniques are contaminating USB drives, replicating itself onto files that some P2P software automatically share, replicating itself onto network shares, as well as spreading itself through e-mail or Windows Messenger.
States Botezatu that bot-herders are possibly using the detected malware, a PC-Trojan, while providing their botnets' services on rent. Net-security.org published this on July 20, 2011.
Moreover, for deterring victims of the Backdoor.IRCBot.ADEQ Trojan from getting suspicious about its infection on their PCs, the malware eliminates other bots like CyberGate, Cerberus, OrgeneraL DDoS Bot Cryptosuite or Blackshades incase it discovers that they're infecting the said PCs, Botezatu adds.
Furthermore, the Trojan even joins other genuine applications listed on the Windows Firewall for ensuring that they don't become active, while it simultaneously attempts at aborting anti-virus alerts.
Meanwhile, any interaction from the bot-controller to its bots or vice-versa is carried out through private messages. Indeed, there maybe occasions when the bot-controller specifies the Trojan's activity via transmitting commands about the intensity and timing of a scheduled assault, or the website to be attacked.
Finally according to Botezatu, botnets are trading devices used universally. They're extremely expensive equipments, which can virtually perform any operation from supplying enormous bandwidth within DDoS assaults on governments, to making money via advertisement fraud. Often, it's possible to track down these assaults, but only to the affected user's PC, the expert concludes that Malwarecity.com reported on July 20, 2011.
» SPAMfighter News - 28-07-2011