Zcodec exploit combines rootkit with social engineering, Trojans to avoid detection
A new program that masquerades as a video codec could bring malware to your end users' devices, Panda Software warned earlier this week.
Zcodec, a new malicious program that incorporates a rootkit, can alter Internet search results, install adware, and fool users into installing Trojans, the security company reported on Wednesday.
The new exploit pretends to be one of the many free video codecs found on the Web, which enable end users to view digital video and audio in a faster, compressed format. But when they click on the software and pull up the license agreement, users find that the software has already been installed on their computers.
The first installation includes a rootkit as well as two executable files, according to Panda. The first modifies the DNS settings so when a user clicks on results from search engines, a different page is displayed. This tactic can be exploited to let perpetrators profit from pay-per-click systems, or to redirect users to pages designed to steal confidential data.
The second executable can install the Ruins.MB Trojan, which is designed to download other malicious programs. Or, in some cases, it installs a casino application, asking for a user's permission to install. Even if the user chooses not to install it, it leaves an icon behind.
The new exploit is an example of the way that attackers are combining multiple techniques -- in this case, rootkits, Trojans, and social engineering -- to create new exploits. Panda said its software enables users to delete the malware.
— Tim Wilson, Site Editor, Dark Reading
About the Author(s)
You May Also Like
Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024