“This month we saw a wide variety of money mule recruitment campaigns thatfor the first timetargeted specific countries in an orchestrated manner,” said Derek Manky, project manager, cyber security and threat research at Fortinet. “The campaigns, which were seeded in a number of Asian and European countries, solicited local individuals who already have or had established relationships in the banking industry or were looking for work as ‘online sales administrators.’”
To make these “localized” campaigns even more effective, they incorporated regional-sounding domain names, such as cv-eur.com, asia-sitezen.com and australia-resume.com. Upon closer scrutiny, Fortinet’s FortiGuard team discovered all three domains were registered to the same Russian contact, and all contact addresses for worldwide recruitment used Google mail hosting. By using localized campaigns, criminals can obtain mule accounts internationally – each one falling under different banks and governing laws. Thus, if one is taken offline (due to increased enforcement activity), the others will remain online and business will be as usual.
Buzus Trojan in E-Card
December also saw the reemergence of the Buzus Trojan, this time being distributed through mass emails posed as e-cards just in time for the holiday season. Once a compromised attachment is opened, the now infected system sends out similar e-cards to everyone it finds in the system’s email address book in an effort to “seed,” growing the botnet. Fortinet’s FortiGuard team discovered the main payload of Buzus was none other than the nefarious Hiloti botnet.
“Hiloti is particularly innovative, as it uses DNS as a communication channel to watermark its report information to its servers,” Manky continued. “This is done to evade detection, since it appears like normal, legitimate DNS traffic. Hiloti, which is distributed through many different botnets, is a preferred piece of malware among cyber criminals today because it incorporates a ‘pay-per-install’ affiliate program wherein established botnet distributors receive a payment each time Hiloti is injected into a new machine. This type of incentive program allows Hiloti originators to grow their infection base quicker than attempting to grow it organically.”
Adobe, Microsoft, Apple Zero-Day Vulnerabilities
In December, FortiGuard labs also disclosed three arbitrary code execution vulnerabilities in Microsoft and Apple products. FGA-2010-65 describes an MS Windows Kernel vulnerability that may allow execution in privileged (Ring0) context. FGA-2010-64 is yet another DLL loading vulnerability that affects multiple products within the Windows 7 operating system. And FGA-2010-62 outlines an integer overflow vulnerability in Apple QuickTime, which can lead to potential infection by simply viewing a specially-crafted QuickTime movie file.
New and old vulnerabilities will continue to be exploited, so it’s important to keep all application patches up to date. Additionally, a valid intrusion prevention system (IPS) can help mitigate attacks against both known vulnerabilities and zero-days. With the use of communication through common protocols, application control is becoming more important to identify malicious activity on the application level.
FortiGuard Labs compiled threat statistics and trends for December based on data collected from FortiGate' network security appliances and intelligence systems in production worldwide. Customers who use Fortinet’s FortiGuard Services should be protected against this vulnerability with the appropriate configuration parameters in place.
FortiGuard Services offer broad security solutions including antivirus, intrusion prevention, Web content filtering and anti-spam capabilities. These services help protect against threats on both application and network layers. FortiGuard Services are updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multi-layered security intelligence and zero-day protection from new and emerging threats. For customers with a subscription to FortiGuard, these updates are delivered to all FortiGate', FortiMail™ and FortiClient™ products.
The full December Threat Landscape report, which includes the top threat rankings in several categories, is available here: http://www.fortiguard.com/report/roundup_december_2010.html. Ongoing research can be found in the FortiGuard Center or via FortiGuard Labs’ RSS feed located here: http://www.fortiguard.com/. Additional discussion on security technologies and threat analysis can be found at the Fortinet Security Blog located here: http://blog.fortinet.com/ and Fortinet’s monthly Security Minute videocast can be found here: http://www.youtube.com/watch?v=brgNBup9dHY.