Vulnerabilities / Threats
9/11/2009
03:04 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Groups Used To Direct Trojan Malware

Malicious software has been found looking to Google Groups for instructions on how to behave badly.

Google's free online newsgroup Google Groups hosts plenty of harmless user-generated content. But like any service that allows users to post information, it also turns out to be useful for "misuser-generated content."

A Symantec security researcher has found that Trojan malware is using Google Groups to fetch commands for directing its attacks.

"A back door Trojan that we are calling Trojan.Grups has been using the Google Groups newsgroups to distribute commands," said Symantec security researcher Gavin O Gorman in a blog post on Friday. "Trojan distribution via newsgroups is relatively common, but this is the first instance of newsgroup [command and control] usage that Symantec has detected."

The Trojan is designed to request a page from escape2sun, a private newsgroup. The page lists instructions for the malware: an index number, a command line to execute, and, optionally, a file to download. The newsgroup also stores responses from the infected host. Commands and responses are encrypted, to conceal the information.

The Trojan itself doesn't appear to be particularly sophisticated. The fact that the private newsgroup containing the commands is in simplified Chinese and the fact the stored commands include references to the .tw domain suggest the author(s) designed it to operate in Taiwan.

Google, not surprisingly, frowns on this sort of thing.

"Using Google Groups, or any Google product, in this way is a violation of our product policies," said a Google spokesperson in an e-mail. "We take various actions, including shutting down accounts, to enforce these policies."

Indeed, it appears that Google has taken steps to shut the account.

Based on statistics gathered about the Trojan's distribution and the presence of several debugging strings in the malware code, O Gorman speculates that the Trojan is a prototype that's undergoing testing.

"The low numbers imply this is a discreet Trojan, used to subtly gather information and potentially determine future attack targets," he explains. "In addition, there is no attempt within the DLL to maintain persistence on the attacked computer, further evidence of a Trojan attempting to remain undiscovered. Such a Trojan could potentially have been developed for targeted corporate espionage where anonymity and discretion are priorities."


InformationWeek has published an in-depth report on the public cloud, digging into the gritty details of cloud computing services from a dozen vendors. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7241
Published: 2014-12-19
The TSUTAYA application 5.3 and earlier for Android allows remote attackers to execute arbitrary Java methods via a crafted HTML document.

CVE-2014-7249
Published: 2014-12-19
Buffer overflow on the Allied Telesis AR440S, AR441S, AR442S, AR745, AR750S, AR750S-DP, AT-8624POE, AT-8624T/2M, AT-8648T/2SP, AT-8748XL, AT-8848, AT-9816GB, AT-9924T, AT-9924Ts, CentreCOM AR415S, CentreCOM AR450S, CentreCOM AR550S, CentreCOM AR570S, CentreCOM 8700SL, CentreCOM 8948XL, CentreCOM 992...

CVE-2014-7267
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the output-page generator in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7268.

CVE-2014-7268
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the data-export feature in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7267.

CVE-2014-8272
Published: 2014-12-19
The IPMI 1.5 functionality in Dell iDRAC6 modular before 3.65, iDRAC6 monolithic before 1.98, and iDRAC7 before 1.57.57 does not properly select session ID values, which makes it easier for remote attackers to execute arbitrary commands via a brute-force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.