Two malware programs help each other stay on computers
Microsoft security exec says Vobfus and Beebone malware proving to be a pain
IDG News Service - Two malicious software programs that help each other stay on computers are proving difficult to remove.
The programs work together by alternately downloading slighter different variations of the other in an attempt to evade antivirus software, wrote Hyun Choi of Microsoft's Malware Protection Center, on Sunday.
One of the malware programs, called Vobfus, was detected in September 2009. It is known as a downloader, or a program that downloads other pieces of code.
Once Vobfus infects a computer, it downloads from a remote command-and-control server a program called Beebone, which is another kind of downloader that installs other malicious programs on a computer. The two work together, downloading variants of the other that are not immediately detected by antivirus products, Choi wrote.
"This cyclical relationship between Beebone and Vobfus downloading each other is the reason why Vobfus may seem so resilient to antivirus products," Choi wrote. Updated antivirus products may detect one variant present on the system; however, newer downloaded variants may not be detected immediately."
Other malware programs have been known to update themselves once a computer is infected. But if the malware is detected and removed, the targeted computer would have to be infected again by an attacker. The approach of Vobfus and Beebone makes it more likely the computer will remain infected.
Vobfus is also a worm that copies itself to removable drives. It uses the autorun function that, if enabled on a computer, causes Vobfus to automatically run and infect Windows computers.
"In the wild, we have observed that Vobfus maintains a very successful removable-drive infection rate," Choi wrote.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts