Feeds

Pro-Tibet rootkit Trojan poses as cartoon

Virus writing becomes a new sport for the Beijing games

Remote control for virtualized desktops

Malware writers have passed the baton in the race to take advantage of the Olympics with the second attempt to load malware onto PCs in a week.

A movie file circulating on the net that poses as a cartoon ridiculing the effort of a Chinese gymnast at the games, followed by images supporting a free Tibet, has been booby-trapped with malware.

While the Flash-based movie runs, a keystroke logging tool is silently installed on the victim's Windows PC. The malware is hidden by rootkit functionality, making it harder to detect and remove.

The malicious cartoon is distributed as an email attachment called "RaceForTibet.exe". Data captured by the keystroke logger is sent to a computer in China. As usual, the threat affects Windows PCs only.

Discovery of the keystroke logger with a rootkit comes a day after net security firm McAfee warned that pro-Tibet websites were being modified by attackers to host malicious software. The Fribet Trojan horse was placed on hacked websites and subsequently loaded onto the PCs through a Windows vulnerability.

As previously reported, the Fribet Trojan contained sophisticated functionality that enabled it to gain access to databases accessed through compromised PCs.

Avert Labs researcher Patrick Comiotto has blogged about the pro-Tibet rootkit on McAfee's Avert Labs blog, providing more technical information and screenshots here. ®

Remote control for virtualized desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?