Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/18/2006
09:40 AM
50%
50%

New Worm Targets AOL

FaceTime Security Labs identified and reported a new worm known as W32.pipeline that is propagating over AOL Instant Messenger

FOSTER CITY, Calif. -- Research experts at FaceTime Security Labs™, the threat research division of IM and greynet security leader FaceTime Communications, today identified and reported a new worm known as W32.pipeline that is propagating over AOL Instant Messenger. The worm delivers an executable file disguised as a JPEG, which in turn calls out to various host computers that download a variety of infection files including rootkits and Trojans that may further propagate the worm through the user’s AIM Buddy List. FaceTime researchers believe that the ultimate goal of the W32.pipeline is to create a sophisticated botnet that can be used for a range of malicious purposes.

Once the user’s PC is infected, it becomes part of a botnet and is under complete control of the hacker to use for a variety of purposes that could include relaying SPAM, performing distributed denial-of-service (DDoS) attacks on other computers or committing financial fraud against online advertisers – commonly called click-fraud. In addition, the potential is high for loss of sensitive personal data stored on the user’s PC.

Like many IM worms, W32.pipeline first appears as an instant message from a familiar contact, luring users into clicking on a link with a contextual phrase. The IM message “hey would it okay if i upload this picture of you to my blog?” downloads a command file called image18.com, which is disguised as a JPEG. Running the file results in csts.exe being created in the user’s system32 folder, part of the Windows operating system.

The infection has the potential to call, via the Internet Relay Chat (IRC) channel, numerous other files that are constantly being updated. Depending on the files downloaded, the infection may create an unwanted service named RPCDB, open up SMTP port 25 (used for email) and attempt to connect to a file upload site. In addition, some files attempt to exploit ADS (alternate data streams). Users may also potentially end up with a rootkit installed on their PC as a result of this chain of infections. Once the user’s PC is infected and under control of the botnet, it can be used to propagate the worm to other users using the same highly refined contextual message, for example "hey is it alright if i put this picture of you on my egallery album? " which will download another command file, again disguised as a JPEG, on additional computers.

FaceTime researchers have noted that this botnet demonstrates much more sophisticated characteristics than any they have seen before, including the ability to authorize only specific IRC clients to log in and manipulate the botnet.

“The emphasis for this latest worm is not so much on the files that are delivered to the users’ computers, but rather on the way these files are deposited onto the system,” said Chris Boyd, director of malware research for FaceTime Security Labs. “Previous IM attacks have tended to focus on the damage done by the files, with little thought on the method of delivery, save for the quickest way to get those files onto a PC. Here, the motivation for the bad guys seems to be in lining up as many ‘install chains’ as possible to insure a consistent pipeline that can be controlled by their rogue botnet.”

FaceTime Communications Inc.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8720
PUBLISHED: 2020-08-13
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
CVE-2020-12300
PUBLISHED: 2020-08-13
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-12301
PUBLISHED: 2020-08-13
Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-7307
PUBLISHED: 2020-08-13
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.
CVE-2020-8679
PUBLISHED: 2020-08-13
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.