Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

New Malware Changes Order of Reading Filenames Otherwise Unsafe

According to a warning by a security investigator, one fresh malicious program is spreading across the Web which reverses the order of reading of a filename and thereby hides the 'exe' within it so that such a file looks from RLO, meaning "right to left override," Infosecurity published on August 19, 2011.

The investigator named Lordian Mosuela attached with Israel-based Commtouch a security company explains that RLO represents one unicode control letter (U+202E), which makes a user read the characters from right-to-left instead of the usual left-to-right. Naturally, the mechanism is useful for languages which are based on right-to-left reading like Hebrew and Arabic. However, cyber-criminals are now abusing it in a manner that end-users will double-click seemingly harmless files, Mosuela warns. Infosecurity published this.

Moreover according to Mosuela, the Commtouch security team reported the technique during 2010, however, over the 3rd-week of August 2011, it has reappeared widely for deceiving end-users into clicking and viewing malware executables. Commtouch's blog posted Mosuela's observations on August 18, 2011.

Reportedly, as per Windows Explorer, the file is another software program, nevertheless the malware, playing a social engineering tactic, utilizes the icon of Microsoft Word.

Furthermore, the malware employs RLO for changing the text's direction to the opposite within a filename. Consequently, an executable or .exe file can look an innocuous .doc file. Citing one e.g., Mosuela shows how the original executable filename 'CORP_INVOICE_08.14.2011_Pr.phylcod.exe' is made to read 'CORP_INVOICE_08.14.2011_Pr.phylexe.doc.'

Apparently, the objective behind using RLO is to make recipients inadvertently click on a file, which maybe unsafe, states the investigator according to whom, the file in the e.g., contains Trojan Bredolab.

Further Mosuela says that the new technique is indicative of cyber-criminals who've become extremely innovative and sophisticated with respect to their attacks while they're attempting all possible tricks for duping unwary end-users.

The specialist therefore advises that users must know about the latest RLO trick while minutely look at file attachments prior to opening them. Moreover, they shouldn't go for suspicious attachments no matter whether a trusted source has sent them as also must ensure that their anti-virus solutions are up-to-date to ward off malware.

Related article: New Zealand Releases Code To Reduce Spam

ยป SPAMfighter News - 9/3/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next