Feeds

Phatbot primed to steal your credit card details

And launch DoS attacks

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

A Trojan horse-type computer virus called Phatbot can steal credit card numbers and launch denial of service attacks on Web sites.

The new virus made its debut on the Internet on Friday (18 March), clogging bandwidth, stealing personal data and initiating denial of service attacks.

Phatbot is a variant of a Agobot, a big family of IRC bots. It can steal personal information such as email addresses, credit card numbers, PayPay details and software licensing codes. It forwards this information using a peer-to-peer (P2P) network, rather than IRC channels exploited by its predecessors. Earlier versions of the bug go by monikers such as Phat, Backdoor.Agobot.fo and Gaobot, according to F-Secure.

Phatbot can also kill any anti-intrusion devices and give people a false sense of security in order to get inside a network and exploit vulnerabilities, F-Secure says.

Phatbot inserts backdoors which can be used to perform distributed denial of service (DDoS) attacks aimed at shutting down Web sites including those of German Internet hosting company Schlund, US telecoms firm XO and Stanford University. The bug also terminates processes belonging to competing malware such as MSBlast.

F-Secure notes that the code running behind Phatbot indicates that this version was not made by the original Agobot backdoor author TheAgo, but by a different writer who got the source code of this backdoor.

"Phatbot is causing quite a bit of stir over here," said Conor Flynn, technical director of US e-security company Rits. "The US Department of Homeland Security sent a number of companies an emergency release about the worm which was then leaked anonymously to The Washington Post," he told ElectricNews.Net. The potential impact of Phatbot on users is much bigger than with previous worms and viruses ,vecause it can harvest passwords, product registration codes and credit card numbers and then send this information back to the authors, he said.

So far, Phatbot infections are limited and some e-security companies are still rating it low-to-medium risk, Flynn says. "However, once a critical mass builds, especially through its use of other backdoors left open, Phatbot is really going to become a problem."

Phatbot can also end standard security processes run by anti-virus programs and firewalls, according to Niall Browne, security architect at Entropy, an Irish Internet security company. "This Agobot variant is not that malicious in that it won't delete files," he said.

"What is interesting are the 600 processes that it can affect once it is inside a network," he said. "It exploits well known ports but once it is inside a network it may not get out again because of the particular ports that it is using and because of that it is fairly easy to contain."

© ENN

Build a business case: developing custom apps

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Amazon says Hachette should lower ebook prices, pay authors more
Oh yeah ... and a 30% cut for Amazon to seal the deal
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Feel free to BONK on the TUBE, says Transport for London
Plus: Almost NOBODY uses pay-by-bonk on buses - Visa
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.