Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Gettin' Geeky with it.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. Smart Defrag
2. GS Auto Clicker
3. Macrium Reflect FREE Edition
4. Sergei Strelec's WinPE
5. MusicBee
6. Visual C++ Redistributable Runtimes AIO Repack
7. K-Lite Mega Codec Pack
8. ImgBurn
9. Unlocker
10. Format Factory
More >>

top reads

Star 8 Windows Shortcuts That’ll Make You More Productive and Save You Time

Star Windows 10 Not Dead Yet - You Can Still Get Updates For Free

Star What is a '400 Bad Request - Request Header or Cookie Too Large' Error and How to Fix It

Star How to Fix Windows Install Error 0xC1900101

Star How to Force Enable Windows 10 Extended Security Updates If The Option Is Not Showing

Star Windows 11 25H2 is Out: What’s New and How to Get It Now.

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star Boost Your PC Speed with ReadyBoost: How a Thumb Drive Can Enhance Your System's Performance

Star 5 Hidden Windows Tools You’ve Had All Along But Never Use

Star Use the Windows 10 Media Creation Tool Before Support Ends For Windows 10 in 2025


MajorGeeks.Com » News » December 2012 » Necurs Rootkit Infections Way Up

Necurs Rootkit Infections Way Up


Contributed by: Email on 12/08/2012 04:20 PM [ comments Comments ]


Infections from a nasty bit of malware, generally delivered by the Black Hole Exploit Kit, surged in November, hitting more than 83,000 machines.

Microsoft’s Malware Protection Center rates the Necurs rootkit threat as severe. Dubbed a rootkit by Kaspersky Lab, Necurs has many dimensions to it. Like most rootkits, it can hide its components from detection while also being capable of downloading additional malware, disabling a long list of security software and installing a backdoor. Attackers can maintain remote access to a machine this way in order to monitor activity, send spam or install scareware.

The key for Necurs is its ability to avoid detection and maintain a persistent presence on machines. It does so by using a command option system that obfuscates the means for determining which commands are valid, said Tim Liu in a write-up on the Microsoft Malware Protection Center blog.

“The author has a full Necurs command list and the attacker has the option to enable some of them or not,” Liu wrote. “Necurs doesn't want its commands to be easily recognized by the antivirus researcher, so the command keys appear to be random numbers, garbage code or obfuscated code.”

The malware’s driver is regularly updated in order to remain hidden from antimalware detection. It is also capable eluding Windows’ built-in Kernel Patch Protection, which is supposed to prevent any modification of the kernel.

Kaspersky Lab first identified Necurs as a rootkit in May 2011; it said the 64-bit version of Necurs does not try to bypass Kernel Patch Protection, also known as PatchGuard, but instead uses a digital signature to skate past.

"The 64-bit driver is signed with something called a 'testing digital signature'. If Windows – Vista and higher – were to be booted in 'TESTSIGNING' mode, the applications can launch the drivers signed with such a signature,” said Alexander Gostev, Chief Security Expert at Kaspersky Lab. “This is a special trap-door which Microsoft has left for driver developers so they can test their creations. Cybercriminals have also made use of this loophole which allows them to launch their drivers without a legitimate signature."

Black Hole and its many variants is likely the most prevalent of the exploit kits in circulation. Commercial versions of the kit are available in underground forums. The downloaders live on compromised websites and install exploits that target any vulnerable functions or applications residing on the victim’s computer.

Black Hole Exploit Kit 2.0 was released in September and included among other enhancements, a random domain generation feature that dynamically moves attacks to new domains once an older compromised site is shut down. Also, exploits for vulnerabilities that have been patched were removed. Pricing for 2.0 also remained the same.






« Chrome Playing Hard to Get with Blackhole Exploit Kit · Necurs Rootkit Infections Way Up · Reindeer game almost gets truck driver slayed »




Comments
comments powered by Disqus

MajorGeeks.Com » News » December 2012 » Necurs Rootkit Infections Way Up

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition