Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Talk nerdy to me.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. MusicBee
5. Sergei Strelec's WinPE
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. Visual C++ Redistributable Runtimes AIO Repack
8. McAfee Removal Tool (MCPR)
9. K-Lite Mega Codec Pack
10. Tweaking.com - Windows Repair
More >>

top reads

Star All the New Features Landing in Windows 11 This December

Star Lossless vs Lossy: When FLAC, APE, and ALAC Beat MP3 and When They Don't

Star Google Search Tricks You'll Actually Use in 2025 and Beyond

Star Fresh PC Checklist: First 12 Things to Do On a New Windows 11 Machine

Star Running AI Models Locally: What They Are, Where to Find Them, and How to Get Started

Star Deciding Between Idle State, Sleep Mode, and Shutdown: What's Best for Your PC?

Star How to Fix VMware Workstation "The Update Server Could Not Be Resolved" Error Installing VMware Tools

Star How to Remove Google Gemini from Your Phone (and Your Life)

Star Windows Bloat Removal Guide: Debloat Safely and Keep What You Need

Star Windows 11 Repair Playbook: SFC, DISM, CHKDSK Without Breaking Stuff


MajorGeeks.Com » News » March 2013 » Phishing Campaign Using Military, Illicit Attachments

Phishing Campaign Using Military, Illicit Attachments


Contributed by: Email on 03/29/2013 03:26 PM [ comments Comments ]


Look out for email attachments offering better sex tips and news about newly developed Chinese stealth frigates, because they are loaded with malware, according to a Securelist report written by Kaspersky Lab expert, Ben Godwood.

The malware is fairly old and not particularly advanced, but a lot of it has been trying to pass through the Kaspersky security network lately and on a very regular basis. Godwood advises that you just don’t open attached documents with titles like: "EAT FOR BETTER SEX.doc," "How to last longer in bed.doc," "6 Awkward Sex Moments, Defused.doc," "9 ways to have better, hotter, and more memorable sex.doc," and "10 Ways to Get More Sex.doc."

You’ll also want to avoid these potentially fascinating attachments: “Stealth Frigate.doc,” “The BrahMos Missile.doc,” and “How DRDO failed India's military.doc”

There is also a third category of malicious documents with roughly the same subjects, but written in Cyrillic characters: “приоритеты сотрудничества.doc,” “Список участников рабочей группы ;(0603-2013).doc,” and “Список кадров.doc Приглашение МИОМ ТЕЙКОВО 2013.doc”

If a user happens to open one of these attachments, he or she will be presented with a decoy document that actually contains what it claims to contain. Godwood posted two of them with his report, one was about a new stealth frigate for the Chinese military and the other had to do with the relationship between a healthy diet and “better sex.”

The malware hiding inside these attachments are Enfal variants, which researchers from TrendMicro wrote about in their Lurid targeted attacks analysis in September 2011. Back then, Enfal’s progenitors were trying to snare government ministries and agencies, military and defense contractors, nuclear and energy sectors, space and aviation, and, the Tibetan community. The countries in which the most machines were compromised were Vietnam, Russia, India, China, and Bangladesh.

Godwood said that this second wave of phishing emails appear to be coming from Australia and the Republic of Korea via “mail.mailftast.com.” That domain’s IP address is fairly dynamic, according to Godwood, but the domain is registered to a Liu Runxin in Shanghai, China.

“When the exploit runs it creates and executes a file called ‘wordupgrade.exe,’” writes Godwood. “This executable drops a DLL called ‘usrsvpla.dll’ into the system32 directory and modifies the ‘WmdmPmSN’ (Portable Media Serial Number Service) registry key to load the DLL into svchost.exe.”

Kaspersky is detecting the “wordupdate.exe” file as “Trojan-Dropper.Win32.Datcaen.d” and the “usrsvpla.dll” file as “Trojan.Win32.Zapchast.affv.”

The most recent samples picked up by Godwood phone home to a command and control server at “yui.bcguard.com,” which has the same registration details as the mail domain above. However, the C&C domain’s IP address is a Chinese one, while the mail domain’s IP is in the U.S. Other domains registered to Liu Runxin include “timmf.com,” “bcbtheory.com,” “bellbuttons.com,” “atmdzxgs.com,” “coffeeibus.com,” and “cymdbd.com.”






« Has Anyone Seen a Missing Scroll Bar? Phony Flash Update Redirects to Malware · Phishing Campaign Using Military, Illicit Attachments · Redneck Country Band Ambushes Google Street View Car! »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2013 » Phishing Campaign Using Military, Illicit Attachments

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition