Vulnerabilities / Threats
9/11/2009
03:04 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Google Groups Used To Direct Trojan Malware

Malicious software has been found looking to Google Groups for instructions on how to behave badly.

Google's free online newsgroup Google Groups hosts plenty of harmless user-generated content. But like any service that allows users to post information, it also turns out to be useful for "misuser-generated content."

A Symantec security researcher has found that Trojan malware is using Google Groups to fetch commands for directing its attacks.

"A back door Trojan that we are calling Trojan.Grups has been using the Google Groups newsgroups to distribute commands," said Symantec security researcher Gavin O Gorman in a blog post on Friday. "Trojan distribution via newsgroups is relatively common, but this is the first instance of newsgroup [command and control] usage that Symantec has detected."

The Trojan is designed to request a page from escape2sun, a private newsgroup. The page lists instructions for the malware: an index number, a command line to execute, and, optionally, a file to download. The newsgroup also stores responses from the infected host. Commands and responses are encrypted, to conceal the information.

The Trojan itself doesn't appear to be particularly sophisticated. The fact that the private newsgroup containing the commands is in simplified Chinese and the fact the stored commands include references to the .tw domain suggest the author(s) designed it to operate in Taiwan.

Google, not surprisingly, frowns on this sort of thing.

"Using Google Groups, or any Google product, in this way is a violation of our product policies," said a Google spokesperson in an e-mail. "We take various actions, including shutting down accounts, to enforce these policies."

Indeed, it appears that Google has taken steps to shut the account.

Based on statistics gathered about the Trojan's distribution and the presence of several debugging strings in the malware code, O Gorman speculates that the Trojan is a prototype that's undergoing testing.

"The low numbers imply this is a discreet Trojan, used to subtly gather information and potentially determine future attack targets," he explains. "In addition, there is no attempt within the DLL to maintain persistence on the attacked computer, further evidence of a Trojan attempting to remain undiscovered. Such a Trojan could potentially have been developed for targeted corporate espionage where anonymity and discretion are priorities."


InformationWeek has published an in-depth report on the public cloud, digging into the gritty details of cloud computing services from a dozen vendors. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2227
Published: 2014-07-25
The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file.

CVE-2014-5027
Published: 2014-07-25
Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page.

CVE-2014-5100
Published: 2014-07-25
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_...

CVE-2014-5101
Published: 2014-07-25
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authn...

CVE-2014-5102
Published: 2014-07-25
SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.