Agressive worm infection leads to banking Trojan infection
Posted on 30.11.2012
An aggressive variant of the VBNA-X "autorun" worm is finding its way onto users' computers, preparing them for further malicious downloads, warns Sophos.

"W32/VBNA-X is a worm, but also exhibits characteristics typically found in a Trojan. Its most obvious method of spreading appears to be through the use of autorun.inf files dropped on removable media and writable network shares," shares Chester Wisniewski.

Still, there are many who have already disable the Autorun/Autoplay option, but still get infected, as the worm hides legitimate folders and file extensions, and creates copies of itself named Porn.exe, Sexy.exe, Passwords.exe and Secret.exe and uses standard Windows 7 icons for them:


"I can easily see how people browsing file shares and USB drives could accidentally click the wrong folder, especially if the real folders are set to hidden," Wisniewski points out.

The worm is capable of adding registry keys to make itself run every time the infected machine boots up, and some variants can also disable Windows Update.

This new variant contacts a C&C server to receive instructions and downloads additional malicious payloads. In the instances investigated by Sophos, that payload was a Zeus Trojan variant - but that can change in the future.






Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals itís our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Sep 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //