Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Keylogging Trojan Dodges Anti-virus Detection -Alert!!
HardOCP ^ | Brian Prince | Brian Prince eWeek

Posted on 05/25/2007 2:34:07 PM PDT by Ernest_at_the_Beach

A new variant of the Russian Trojan Gozi, armed with keylogging functionality, is making the rounds again. What makes this time different is that the Trojan can scramble itself to avoid detection by your anti-virus software.

The Trojan is believed to have been spreading since April 17. Like the original, which was discovered earlier in 2007, the new version of Gozi steals data from encrypted SSL (Secure Sockets Layer) streams. The latest variant was uncovered May 7 by Don Jackson, a security researcher at SecureWorks in Atlanta.

Comments

Posted by Steve 3:15 PM (CDT)


TOPICS: News/Current Events; Technical
KEYWORDS: cc; hitech; internetexplorer; keylogger; malware; microsoft; spyware; trojan; windows
Navigation: use the links below to view more comments.
first 1-2021-4041-47 next last

1 posted on 05/25/2007 2:34:08 PM PDT by Ernest_at_the_Beach
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

This does not sound good....


2 posted on 05/25/2007 2:34:43 PM PDT by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Honeybunch

Ping.


3 posted on 05/25/2007 2:36:11 PM PDT by OKSooner
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

Yikes!


4 posted on 05/25/2007 2:37:56 PM PDT by Paul Ross (Ronald Reagan-1987:"We are always willing to be trade partners but never trade patsies.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

What’s “Anti-Virus Software?”


5 posted on 05/25/2007 2:39:04 PM PDT by papertyger ("The first thing we do, let's kill all the lawyers" -- wisdom for the ages by Wm. Shakespeare)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All
New and improved version of Gozi Trojan horse on the loose
Stealthier Russian malware on the loose since April

******************************EXCERPT******************************

May 19, 2007 (Computerworld) -- A new, stealthier version of a previously known Russian Trojan horse program called Gozi has been circulating on the Internet since April 17 and has already stolen personal data from more than 2,000 home users worldwide.

The compromised information includes bank and credit card account numbers (including card verification value codes), Social Security numbers and online payment account numbers as well as usernames and passwords. As with its predecessor, the new version of Gozi is programmed to steal information from encrypted Secure Sockets Layer (SSL) streams and send the stolen information to a server in Russia.

The variant was discovered by Don Jackson, a security researcher at Atlanta-based SecureWorks Inc. who also discovered the original Gozi Trojan horse back in January.

Two core "enhancements"

According to Jackson, the new version is very similar to the original Gozi code in its purpose, but features two core enhancements. One of them is its use of a new and hitherto unseen "packer" utility that encrypts, mangles, compresses and even deletes portions of the Trojan horse code to evade detection by standard, signature-based antivirus tools. The original Gozi, in contrast, used a fairly commonly known packing utility called Upack, which made it slightly easier to detect than the latest version.

This version of Gozi also has a new keystroke-logging capability for stealing data, in addition to its ability to steal data from SSL streams. According to Jackson, the keystroke logger appears to be activated when the user of an infected computer visits a banking Web site or initiates an SSL session. It is still unclear how exactly the keystroke logger knows to turn itself on and capture information, Jackson said.

Apart from those two differences, the variant is identical to Gozi, Jackson said. The Trojan horse takes advantage of a previously fixed vulnerability in the iFrame tags of Microsoft Corp.'s Internet Explorer to infect systems. Users typically appear to be infected when visiting certain hosted Web sites, community forums, social networking sites and those belonging to small businesses.

A service provider steps in

The server to which the stolen data was being sent to was located on a Russian network.

6 posted on 05/25/2007 2:39:11 PM PDT by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: papertyger

Are you logged ON?


7 posted on 05/25/2007 2:39:46 PM PDT by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Ernest_at_the_Beach

Are you series?


8 posted on 05/25/2007 2:41:30 PM PDT by papertyger ("The first thing we do, let's kill all the lawyers" -- wisdom for the ages by Wm. Shakespeare)
[ Post Reply | Private Reply | To 7 | View Replies]

Comment #9 Removed by Moderator

To: Ernest_at_the_Beach

Linux. ‘Nuff said.


10 posted on 05/25/2007 2:41:58 PM PDT by harwood (Ann Coulter: Future SCOTUS nominee!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: harwood

That’s what I run.


11 posted on 05/25/2007 2:44:19 PM PDT by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: papertyger

“What’s “Anti-Virus Software?””

It protects us from the bird flu..


12 posted on 05/25/2007 2:44:57 PM PDT by HereInTheHeartland (Never bring a knife to a gun fight, or a Democrat to do serious work...)
[ Post Reply | Private Reply | To 5 | View Replies]

To: HereInTheHeartland

My sister got the bird flu after being bitten.


13 posted on 05/25/2007 2:46:31 PM PDT by papertyger ("The first thing we do, let's kill all the lawyers" -- wisdom for the ages by Wm. Shakespeare)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Ernest_at_the_Beach

There is another one also — maybe even worse. The trojan, Kardphisher, renders a popup to the user, saying their software has been activated by another person. It then says that, in order to maintain activation, they must buy it. It asks not only for credit card information, but the PIN and 3-digit security number as well.

The popup says it comes from Microsoft, but it does not. The sender wants your credit card info.


14 posted on 05/25/2007 2:52:15 PM PDT by WaterWheeler
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

Anyone who uses a credit card on the Internet should know that you should never type your number in sequentially the way it appears on the card.

You should break it up into pieces and use the mouse to relocate the cursor. NEVER THE ARROW KEYS - keyloggers can read arrow key movements, but so far... not mouse movements.

So say, for example, that your credit card number was: 123 456 789;

You should type first 456; then use the mouse to move the cursor in front of it and type 123; then use the mouse one more time and type 789.

This is simplified, but a simple procedure of NEVER typing a number in the order it appears on your credit card, will defeat any keyloggers tha currently exist.

I have helped a friend install a keylogger once during a messy divorce, and it’s amazing what information you can capture! It also makes it easy to figure out a way to defeat such software.

NEVER TYPE IN YOUR CC NUMBER WITHOUT SCRAMBLING IT AS I DESCRIBED. It’s not a big hassle, and it gives you an added layer of security. Even if someone did sneak a keylogger onto your machine somehow, they would not get a useful CC number if you follow this simple trick.


15 posted on 05/25/2007 2:57:04 PM PDT by Bon mots
[ Post Reply | Private Reply | To 1 | View Replies]

To: WaterWheeler

BUMP!


16 posted on 05/25/2007 3:02:05 PM PDT by Publius6961 (MSM: Israelis are killed by rockets; Lebanese are killed by Israelis.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Bon mots

Interesting advice! Thanks!


17 posted on 05/25/2007 3:02:14 PM PDT by Enterprise (I can't talk about liberals anymore because some of the words will get me sent to rehab.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Bon mots
Great suggestion!

I can think of some deliciously useful variants of that!

18 posted on 05/25/2007 3:03:49 PM PDT by Publius6961 (MSM: Israelis are killed by rockets; Lebanese are killed by Israelis.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Bon mots

Many thanks.


19 posted on 05/25/2007 3:04:30 PM PDT by RinaseaofDs
[ Post Reply | Private Reply | To 15 | View Replies]

To: Bon mots
Anyone who uses a credit card on the Internet should know that you should never type your number in sequentially the way it appears on the card.

Interesting technique that may work against some keyloggers, but the program in question is also apparently scarfing SSL session information too, so that wouldn't work if you're infected by it.

 Thank God I use Linux.
 

20 posted on 05/25/2007 3:04:40 PM PDT by zeugma (MS Vista has detected your mouse has moved, Cancel or Allow?)
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-47 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson