Feeds

‘Kill Bill’ Trojan fails to rack up body count

Low risk malware poses as movie subtitle file

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

A new backdoor (spying program) which poses as a DivX file containing subtitles from the latest Quentin Tarantino film Kill Bill has been spotted on the Net.

The low-spreading Manda-A (AKA PWSteal.Salira) Trojan arrives as a .RAR archive with a malformed header. This archive, 35347 bytes in size, has a movie subtitle name Kill Bill.

Subtitles are used alongside DivX movie clip files to enable foreign language speakers to follow the plot of a film.

As a social engineering trick, sending infectious files that pose as movie subtitles would seem to be of questionable effectiveness. Indeed very few copies of the Trojan have been spotted so far, making Manda more of a curious nuisance than a serious threat.

Which is just as well, as the Trojan payload contained in Manda is quite nasty, according to BitDefender. The Romanian AV firm warns that some badly-configured archivers may execute the Trojan on a simple archive view.

"It tricks users into executing the backdoor, using the name of the movie 'Kill Bill'. The ZIP file was specially crafted, so most antivirus products will not identify the file inside as executable," said Patrick Vicol, virus researcher at BitDefender Lab.

"The backdoor sends network and internet passwords, as well as statistical system information by email, to the virus author", he added.

Details inside the virus body may indicate that the author is a Romanian fan of underground music, according to BitDefender. A technical description of the Trojan can be found here or from Symantec here. ®

Beginner's guide to SSL certificates

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.