Feeds

Targeted Trojan attacks on the rise

Coming at ya!

The essential guide to IT transformation

Analysis On December 1, 2005, two email messages were sent from a computer in Western Australia to members of two different human rights organizations. Each email message carried a Microsoft Word document with a previously unknown exploit that would take control of the targeted person's computer and open up a beachhead into the group's network.

The attack failed, as did a second attempt to infiltrate the same human-rights groups a week later, due in no small part to an overabundance of caution on the part of email security provider MessageLabs, which initially blocked the emails based on the strangeness of the Word attachments. The attacks only targeted a single person at each organization and, after the two attempts, never repeated.

Such targeted Trojan horse attacks are quickly becoming a large concern for corporations, the military and political organizations, said MessageLabs security researcher Alex Shipp. The email security provider intercepted 298 such attacks between May 2005 and May 2006, and the threat of targeted Trojans is only increasing.

"If you haven't noticed these attacks and you are a big company, you have likely already been attacked," Shipp told attendees at the Virus Bulletin 2006 conference. "Your problem is no longer how do I avoid being attacked, but how do I find where I've been compromised."

Targeted Trojan horse attacks are quickly becoming a major issue for the antivirus and computer-security industries. Last year, computer emergency response groups in the UK, Canada and Australia warned of such attacks. While the United States Computer Emergency Readiness Team (US-CERT) did not issue a warning, security firms confirmed at the time that US government agencies and companies had already been targeted by such malicious software.

A major problem for large companies, government agencies and other potential targets is that antivirus software is not good at stopping low-volume attacks aimed at single companies. Traditional antivirus programs detect widespread attacks based on matching to a known pattern and do not fare well against low-volume Trojans. And even when they do detect such attacks, the larger volume threats are inevitably moved to the top of the firms' to-do lists, because they affect a larger number of customers, said antivirus industry insiders.

"There is no value whatsoever in having signature-based antivirus when facing a targeted attack," said Joshua Corman, host protection architect for Internet Security Systems (ISS). "We, the AV industry, haven't turned the corner in being able to detect these attacks consistently."

If a company misses the initial attack, the results can be costly, Corman said. He pointed to an example of one company, a pharmaceutical firm, that got infiltrated by a targeted Trojan attack. The company only realized it had been compromised when some valuable data was encrypted and the key held for ransom. The company had to pay and, after the incident, spent a month cleaning the compromised systems from its offices in three countries. Corman would not name the company, which became ISS client after the incident.

While MessageLabs might detect tens of thousands of copies of a typical mass-mailing computer viruses in a single day, the company is finding, at most, ten targeted Trojans a week, Shipp said. According to the data collected by MessageLabs, more than half of the 298 attacks detected over 12 months consist of a single email sent to a single person at a company. In total, 1,344 emails were sent during the period studied by Shipp. Military agencies, human rights organizations and pharmaceutical companies are some of the types of groups that are being targeted by specifically aimed attacks.

The attacks are also very well researched, Shipp said. One targeted Trojan was sent to five employees at one company - every single person was a member of the firm's research and development team.

"The bad guys have done their homework," Shipp said.

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?