Hacked computers receive updated spam tool
Apparently even the bad guys have patch days now
IDG News Service - Computers infected with a well-known piece of malware began downloading a new spam tool Sunday night used by hackers to send unwanted e-mail.
Malware writers working as part of the infamous Bagle spam gang began sending a new spamming tool Sunday night to thousands of hacked computers, said Mikko Hypponen, chief research officer at F-Secure Corp., a security company in Helsinki, Finland.
If a computer is infected with the Bagle worm, a hacker can download other malicious programs to the machine. In turn, those programs can send out spam to other machines without the knowledge of the user.
Once a computer is under their control, malware writers can upgrade the malicious software they have installed. Last night, machines infected with Bagle variants were downloading the new spam tool from a server in Slovakia hosting a real-estate Web site.
This is the way virus writers can upgrade the infected machines, Hypponen said. Its like [Microsoft Corp.s] Windows update for viruses.
The download link was buried within the Web site, and its unlikely the owners had any idea it was being used. Last night, the link was cut off, Hypponen said.
But within hours, a French site hosted in the U.S. was hosting a link with the malware, Hypponen said. The Internet service provider hosting that site has been contacted, but so far, the link remains active, he said.
F-Secure uses automated tools to poll URLs used by virus writers to host bad malware, Hypponen said.
About 99% are decoys, set up to throw off attempts to track them down. But when a site suddenly becomes active, Hypponen said, efforts are made to contact the Internet service providers to shut them down.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts