The Register® — Biting the hand that feeds IT

Feeds

Monster Trojan monsters job seekers' records

Mommy, there's a horse under my bed

Supercharge your infrastructure

Monster.com suffered a major data breach at the weekend, with a Trojan horse stealing more than 1.6 million records from the job search site's database.

Symantec's Security Response blog reports the Trojan, called Infostealer.Monstres, can steal sensitive information from Monster.com by using employer accounts which have presumably been compromised by an attacker.

"Such a large database of highly personal information is a spammer's dream," Symantec security analyst Amado Hidalgo wrote in the blog.

Using the stolen account, the Trojan logs into Monster.com job recruiter website and searches for all available resumes, potentially lifting the name, email address, home address and phone numbers of its victims. The program then attempts to post the stolen information on a remote server controlled by the attacker.

From Symantec's blog:

The Trojan sends HTTP commands to the Monster.com Website to navigate to the Managed Folders section. It then parses the output from a pop-up window containing the profiles of the candidates that match this recruiter's saved searches.

The security firm reports the attackers have stolen over 1.6 million entries on the site, with personal information belonging to several hundred thousand individuals, mostly based in the US.

The main file used by the Trojan is ntos.exe, an executable also commonly used by Trojan.Gpcoder.E, a similar piece of malware. The Trojans share the Monster.com logo for the executable icon - leading Symantec to speculate the same group is behind both.

Adding to the mess, Trojan.Gpcoder.E has reportedly been sent in Monster.com phishing emails. The emails use the personal information to fool users into downloading a Monster Job Seeker Tool, which is in reality, Trojan.Gpscoder.E.

This nasty executable encrypts files in the affected computer — and leaves a text file demanding the victim pay the attackers in order to recover the data.

Unfortunately, even a massive data security breach such as this one has become commonplace in recent years. Security watchgroup Privacy Rights Clearinghouse lists 18 data breaches in the US this month alone - not counting Monster.com. According to the organization, 159 million records containing sensitive personal information have been compromised in the US by security breaches since 2005.

Symantec has told Monster.com of the compromised recruiter accounts so they can be disabled. In the meantime, Symantec advises users not to publish personal information on the site - particularly Social Security numbers. Users should use a separate disposable email address and avoid giving sensitive details until the prospective employer has been established as legitimate.

The firm also recommends users to observe basic security practices, such as keeping your computer up-to-date; configuring your email to block attachments commonly used to spread viruses such as .vbs, .bat, .exe, .pif and .scr files; and of course, never execute software that doesn't come at your request, or hasn't been scanned for viruses first. ®

5 ways to prepare your advertising infrastructure for disaster

Whitepapers

5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Email delivery: Hate phishing emails? You'll love DMARC
DMARC has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name..
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Email delivery: 4 steps to get more email to the inbox
This whitepaper lists some steps and information that will give you the best opportunity to achieve an amazing sender reputation.

More from The Register

next story
Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
Anyone can touch your phone and make it give up its all
Hundreds of hackers sought for new £500m UK cyber-bomber strike force
Britain must rm -rf its enemies or be rm -rf'ed, declares defence secretary
NSA in new SHOCK 'can see public data' SCANDAL!
What you say on Twitter doesn't stay on Twitter
UK's Get Safe Online? 'No one cares' - run the blockbuster ads instead
Something like Jack Bauer's 24 ... whatever it'll take to teach kids how to bat away hackers
Sweet murmuring Siri opens stalker vulnerability hole in iOS 7
'Siri, hand over my contacts and history now…'
Facebook allows full personal data ransack with Graph Search
Posts, updates, the lot. Our ad sales will boom. Mwu-ha-haaaa ... bitch
London schoolboy cuffed for BIGGEST DDOS ATTACK IN HISTORY
Bet his parents wish he'd been playing computer games
GCHQ's CESG CCP 4 UK GOV IT BFFs? LOL RTFA INFOSEC VIPs ASAP
Yet another security certificate fiddled with by Brit spooks
prev story