Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Auto download adware carries vicious payload
vnunet.com ^ | 03 Mar 2005 | Robert Jaques

Posted on 03/03/2005 1:39:36 PM PST by holymoly

Security experts issued a warning this morning after detecting infections caused by Searchmeup, the first adware to use the Exploit/LoadImage vulnerability which downloads itself onto computers without the user's permission.

Panda Software's PandaLabs warned that the pages from which Searchmeup are downloaded also contain a series of exploits to download other malware onto the computer, such as the Tofger.AT Trojan, which steals banking passwords, Dialer.BB and Dialer.NO, and adware called Adware/TopConvert.

Searchmeup is downloaded onto the computer when the user visits maliciously coded web pages. Once installed it changes the home page to that of a search engine that displays pop-ups every time it loads with the aim of installing spyware and diallers on infected computers.

Searchmeup affects computers running Windows 2003, XP, 2000, NT, Me and 98, and allows arbitrary code to be run.

It could be exploited by an attacker hosting a specially crafted cursor or icon on a malicious web page or HTML email. Microsoft has released a patch to correct this problem, and users are advised to install it immediately.

The web pages from which Searchmeup is downloaded also drop Tofger.AT onto computers, a Trojan which runs every time Internet Explorer is opened.

Tofger.AT keeps track of the user's internet activity, logging passwords for secure 'https' connections which are often used for connections with online banks. Once it has collected this information, Tofger.AT sends it to a remote server.

Searchmeup can also generate an error in the 'services.exe' file, informing users that the computer will be restarted in one minute.

After the restart, the computer operates perfectly. On some occasions Searchmeup can also display blue screen errors, and Tofger.AT can actually update itself to a new version.

"The Exploit/LoadImage vulnerability can be used on web pages or HTML email by crafting a special icon or image file that causes a buffer overflow that in turn can be used to take control of the user's computer," said Patrick Hinojosa, chief technology officer at Panda Software US.

"This can be very serious as the user does not have to do anything unusual like opening a suspicious attachment. This is what is sometimes referred to as a 'drive by' attack."

Luis Corrons, director of PandaLabs, added: "The appearance of Searchmeup is a sign of the continuous evolution of malware, and of spyware and adware in particular.

"The first stage was that adware reached computers as a component of a freeware application, then web pages appeared that installed adware on users' computers using ActiveX.

"Now they have gone a step further, as Searchmeup exploits a vulnerability that even virus creators had not used until now."


TOPICS: News/Current Events
KEYWORDS: adware; autoinstall; browser; dialer; driveby; hijack; malware; spyware; trojan
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-115 next last
To: holymoly
Internet Explorer Privacy & Security Settings

That is a fantastic site. Thank you very much. A wealth of information.

81 posted on 03/03/2005 4:41:28 PM PST by processing please hold (Islam and Christianity do not mix ----9-11 taught us that)
[ Post Reply | Private Reply | To 65 | View Replies]

To: backhoe
I would appreciate your help immensely, Thank you.
82 posted on 03/03/2005 4:43:24 PM PST by processing please hold (Islam and Christianity do not mix ----9-11 taught us that)
[ Post Reply | Private Reply | To 76 | View Replies]

To: holymoly

Couldn't they just hack the dll file and change the pointers ?


83 posted on 03/03/2005 4:55:13 PM PST by John Lenin (Liberalism is a disease and it needs to be eradicated)
[ Post Reply | Private Reply | To 78 | View Replies]

To: HairOfTheDog

If you knew what I knew about the net you wouldn't sbe so sarcastic. Anything is possible. The whole internet is based on zero's (0) and ones (1).


84 posted on 03/03/2005 5:09:48 PM PST by John Lenin (Liberalism is a disease and it needs to be eradicated)
[ Post Reply | Private Reply | To 77 | View Replies]

To: pbrown
OK- hang on to your hat ( wife's toy needs an eight-hour charge, so the kitchen PC is still free )... after you download and install Ccleaner, when you run it the first time, poke the "windows" tab in the right pane, if it isn't already open-- it has a list of boxes to check for cleaning and removal.

The top entries are for Internet Explorer- check these boxes:
temporary internet files
delete index.dat files

Be sure cookies are unchecked if you wish to keep them, likewise typed url's ( they appear in the address box in IE when you poke the bar on its right. They can be useful, but if you check and see a large number you don't use, you can check the box and be rid of them ). Autocomplete form history may be worth saving, too, so be sure it is unchecked.

Next is Windows Explorer ( this is not IE; it's part of the system that lets you look at and delete files, copy, etc.
I recommend checking all the boxes there.

Next is system- again, check all the boxes there.

The last category is Advanced- be sure all are unchecked-- don't check a one.

Then, poke "run cleaner" at lower right, and the right pane will fill with all the junk your PC has acquired. It will be a lot, the first time- then simply "exit."

85 posted on 03/03/2005 5:10:12 PM PST by backhoe (-30-)
[ Post Reply | Private Reply | To 82 | View Replies]

To: John Lenin

Who's being sarcastic?


86 posted on 03/03/2005 5:10:35 PM PST by HairOfTheDog (It is no bad thing to celebrate a simple life!)
[ Post Reply | Private Reply | To 84 | View Replies]

To: HairOfTheDog

If you ever worked with a programming language such as assembler you would realize it doesn't matter what software you use it's just a matter of reverse engineering a file and changing the pointers.


87 posted on 03/03/2005 5:13:34 PM PST by John Lenin (Liberalism is a disease and it needs to be eradicated)
[ Post Reply | Private Reply | To 86 | View Replies]

To: Moose4
I'm not cocky, I just like it better. I use it on Linux as well as Windoze.

But, I am tired of hearing from the IE crowd, "Just wait until they target you...".

88 posted on 03/03/2005 5:15:11 PM PST by frogjerk
[ Post Reply | Private Reply | To 32 | View Replies]

To: John Lenin

I suppose.

But in order for someone to hack your AV dll, wouldn't they already need access to your system, via a trojan, etc.?

Perhaps you could limit/reduce the possibility by creating a firewall rule (or rules) which would restrict your AV/Updater to the IP (or range of IPs) of your AV update server(s).

I personally run a fairly restrictive firewall. For instance, I limit my email client to a single IP address - that of my mail server - and ports 110 & 25.


89 posted on 03/03/2005 5:19:00 PM PST by holymoly ("A lot" is TWO words.)
[ Post Reply | Private Reply | To 83 | View Replies]

To: John Lenin

Live whatever way you can then... before they getcha.


90 posted on 03/03/2005 5:19:42 PM PST by HairOfTheDog (It is no bad thing to celebrate a simple life!)
[ Post Reply | Private Reply | To 87 | View Replies]

To: John Lenin

I don't think he was being sarcastic. He's just a little jaded about freeware. ;)


91 posted on 03/03/2005 5:20:39 PM PST by holymoly ("A lot" is TWO words.)
[ Post Reply | Private Reply | To 84 | View Replies]

To: holymoly

~she~ And you're otherwise right. :~D


92 posted on 03/03/2005 5:21:50 PM PST by HairOfTheDog (It is no bad thing to celebrate a simple life!)
[ Post Reply | Private Reply | To 91 | View Replies]

To: HairOfTheDog

Cool, I was half right. That should improve my average significantly. ;)


93 posted on 03/03/2005 5:28:07 PM PST by holymoly ("A lot" is TWO words.)
[ Post Reply | Private Reply | To 92 | View Replies]

To: HairOfTheDog

When you become a target you have to be careful. :-)


94 posted on 03/03/2005 5:35:08 PM PST by John Lenin (Liberalism is a disease and it needs to be eradicated)
[ Post Reply | Private Reply | To 90 | View Replies]

To: backhoe

Got it. I'll give it a try. If you don't see me again.....BYE BYE. And thanks.


95 posted on 03/03/2005 5:41:00 PM PST by processing please hold (Islam and Christianity do not mix ----9-11 taught us that)
[ Post Reply | Private Reply | To 85 | View Replies]

To: Republicanus_Tyrannus

I assume it also executed the Trojans, or put them somewhere on your filesystem (path, etc) where they would be executed? Which Trojans were they, and how much trouble did you have fixing their effects?


96 posted on 03/03/2005 5:42:15 PM PST by Caesar Soze
[ Post Reply | Private Reply | To 50 | View Replies]

To: holymoly

Ping for info


97 posted on 03/03/2005 5:47:44 PM PST by Mustng959 (In loving memory of those that gave their all to preserve our Freedoms!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: backhoe

See how dumb I am at computers. It took me this long. I got rid of 64.5MB......is that a lot?


98 posted on 03/03/2005 6:47:39 PM PST by processing please hold (Islam and Christianity do not mix ----9-11 taught us that)
[ Post Reply | Private Reply | To 63 | View Replies]

To: pbrown

"I got rid of 64.5MB......is that a lot?"

Based on 2 home machines and the wife's lobby computer, that's about average.

Just for informational purposes, look here:

There are folders on your computer that Microsoft has tried hard to keep secret.
http://www.fuckmicrosoft.com/content/ms-hidden-files.shtml

These files are part of a detailed series of articles on system maintenance in the LangaList newsletters-
http://www.langa.com/cleanall_bat.htm




Please note- the information at those sites is verging into the "industrial strength" area of computer use- don't try it at home unless you have backed your whole system up, or have the stuff needed ( original "install" CD's, plus data backup of everything ) to make a bare-metal ( fdisk & format ) recovery.

That said, take a look and see how much your friendly PC is hiding from you.


99 posted on 03/04/2005 12:48:23 AM PST by backhoe (-30-)
[ Post Reply | Private Reply | To 98 | View Replies]

To: backhoe

Scary bump!

Thanks for the info.


100 posted on 03/04/2005 6:01:00 AM PST by MonroeDNA (Handshakes can cause the spread of disease. Be considerate--sniff my butt.)
[ Post Reply | Private Reply | To 99 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-115 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson