Skip to comments.
New Trojan (BHO) disguises malicious traffic
ITNews.com.au ^
| 9 August 2006
| Gregg Keizer
Posted on 08/08/2006 7:14:04 PM PDT by holymoly
Websense raises the alarm about a phishing Trojan that uses a new technique to cloak its activity.
The Web security company said that the Trojan, which installs itself as an Internet Explorer helper object, waits for the user to enter information in specific Web site forms -- particularly online banking sites -- then zaps the stolen data back to the attacker.
What's unique about the new Trojan, said Websense, is that it delivers that data via ICMP packets. Keylogging Trojans usually transmit purloined usernames and passwords via e-mail or a HTTP POST command. Both can be easily spotted.
"Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into the data section of an ICMP ping packet," Websense's warning read. "To network administrators and filtering software, the ICMP packet looks like legitimate traffic."
Websense confirmed the new technique's effectiveness by infecting a system with the Trojan, then entering account information into the SSL-protected Deutsche Bank Web site. As expected, the Trojan captured the information and sent an ICMP ping to a malicious remote server.
TOPICS: Chit/Chat; Computers/Internet
KEYWORDS: bho; icmp; ie; msie; opera; ping; trojan
the Trojan...installs itself as an Internet Explorer helper objectAnd can most likely be avoided by using an alternative browser:
Opera
Mozilla
Also, WinPatrol, and, I believe, Spybot - Search & Destroys' Teatimer, both offer protection against installation of unwanted BHOs.
1
posted on
08/08/2006 7:14:06 PM PDT
by
holymoly
To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...
2
posted on
08/09/2006 5:31:35 AM PDT
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: holymoly
Websense confirmed the new technique's effectiveness by infecting a system with the Trojan, then entering account information into the SSL-protected Deutsche Bank Web site. As expected, the Trojan captured the information and sent an ICMP ping to a malicious remote server. why would they disclose this? this should have been given to the FBI or CIA, they could have tracked it down and busted the person behind it...
To: Echo Talon
And in the mean time admins would be exposed when all they have to o it block outgoing ICMP packets from their LAN! Why would you have people exposed to identity theft?
4
posted on
08/09/2006 6:08:58 AM PDT
by
N3WBI3
("I can kill you with my brain" - River Tam)
To: holymoly
If it's pinging a server they should be able to do a traceroute on it and find out where it is.
I'd love to catch one of these guys, just once.
5
posted on
08/09/2006 6:14:39 AM PDT
by
unixfox
(The 13th Amendment Abolished Slavery, The 16th Amendment Reinstated It !)
To: N3WBI3
A lot of orginizations already restrict ICMP traffic to particular hosts. Ours does, and it makes it really difficult to troubleshoot some problems.
6
posted on
08/09/2006 6:38:12 AM PDT
by
zeugma
(I reject your reality and substitute my own in its place. (http://www.zprc.org/))
To: holymoly
I've got WinPatrol -- it's a Godsend...
7
posted on
08/09/2006 6:47:35 AM PDT
by
GOPJ
(Al Gore - the original "Millions Could Die" kind of guy....)
To: Echo Talon
why would they disclose this? this should have been given to the FBI or CIA, they could have tracked it down and busted the person behind it... Well, that's the Micro$oft way. Keep it secret until you have a fix; meanwhile unsuspecting users are merrily surfin away entering personal data that may or may not be compromised.
Yes, they could, and probably will track down the black hat, but at least the word is out and people can take measures to protect themselves.
8
posted on
08/09/2006 6:47:50 AM PDT
by
AFreeBird
(... Burn the land and boil the sea's, but you can't take the skies from me.)
To: GOPJ
I've got WinPatrol -- it's a Godsend... I'll try it. I may replace my TeaTimer with WinPatrol.
9
posted on
08/09/2006 6:59:41 AM PDT
by
Bloody Sam Roberts
(Dawn of light...lying between a silence and sold sources...)
To: EdReform
10
posted on
08/09/2006 7:03:01 AM PDT
by
EdReform
(Protect our 2nd Amendment Rights - Join the NRA today - www.nra.org)
To: zeugma
Zeg,
As does mine but many do not and would not think to... A warning that says *ICMP Virus* might wake up their admins and protect their users..
Not having ICMP for diag's stinks, but having hackers not have ICMP for diags rules..
11
posted on
08/09/2006 7:16:19 AM PDT
by
N3WBI3
("I can kill you with my brain" - River Tam)
To: AFreeBird
yea, well they give you now clue as how to remove it or how to tell it you even have it... it should have been kept a secret until they caught him red-handed..
To: Echo Talon
Well, if it's using the system "ping" command to transmit, then you could - if you were aware - take steps to lock it down.
13
posted on
08/09/2006 7:21:55 PM PDT
by
AFreeBird
(... Burn the land and boil the sea's, but you can't take the skies from me.)
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson