Feeds

Video Trojan hoax scares up publicity for security firm

Another ambitious start-up banging another empty drum

  • alert
  • submit to reddit

The essential guide to IT transformation

Updated It sounded so very exciting on Friday: a relatively unknown computer security firm called Network Security Technologies (NETSEC) was rushing to meet with the FBI to discuss a devastating new Trojan they had discovered joined to an .avi video file.

The Trojan, they said, was capable of infecting personal computers and commandeering them to attack Web sites, resurrecting shades of the media frenzy surrounding February's DDoS attacks.

Clearly, NETSEC had struck gold.

Yet on Saturday, the FBI's National Infrastructure Protection Centre (NIPC) Web site remains strangely devoid of any mention of this impending calamity, as does the Carnegie Mellon University Computer Emergency Response Team (CERT) site.

Apparently, the wire services had got a few things wrong on Friday, no doubt with NETSEC's gentle encouragement.

We now know that the video Trojan, which NETSEC dubbed 'Serbian Badman' (ooohh, how scary that sounds), is actually known by the tragically prosaic name 'Downloader' (aka Backdoor.ldr; Downloader.Kit; Trojan.Win32.Loder.WPW; W95/Loader; and WWWPW).

It works by fetching, downloading and silently running another, and quite familiar, Trojan called 'Sub7', which consists of a remote server enabling a third party to control an infected computer.

We are terribly disappointed to report that the Sub7 server is not capable of launching DDoS attacks, unless it has been updated radically since the last time we, em, 'evaluated' it.

Meanwhile, Network Associates' McAfee site has condescended to run some information on NETSEC's sensational new discovery, but what they have to say sounds painfully familiar.

The Downloader Trojan "downloads another Trojan from the Internet and runs it silently. The downloaded Trojan is identified as 'BackDoor-G2'" [aka Sub7].

"NETSEC alerted the Internet community about BackDoor-G2 by calling it 'Serbian Badman Trojan (TSB Trojan)'. News stories suggest that the controlling Trojan which is downloaded is a new threat -- it is not. Although the Trojan known as "Downloader" is new, the file downloaded is a known Trojan."

In other words, NETSEC's discovery amounts to nothing more than a publicity stunt by an opportunistic security firm in quest of free advertising in the form of media attention.

The Register is shocked....shocked....to learn that media manipulation is going on. ®

Previous coverage

Movie clip Trojan to be used in DDoS-style attack

5 things you didn’t know about cloud backup

More from The Register

next story
Microsoft exits climate denier lobby group
ALEC will have to do without Redmond, it seems
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?