Feeds

Magic mystery malware menaces many UK machines - new claim

Who exactly is spying on thousands of Brit biz PCs?

Security for virtualized datacentres

Security researchers have found malware that communicates using an unknown protocol and is largely targeting UK businesses.

The mystery software nasty has infected thousands of machines at organisations in finance, education, telecoms and other sectors, we're told.

It initially phones home to its masters by establishing a HTTP connection to what appear to be a command-and-control server. The malicious software then uses a custom protocol to authenticate itself, and always uses a magic word - literally, some_magic_code1 - at the start of the conversation, according to security researchers at Seculert.

In one instance, the malware contacted the command server for further instructions, and was told to create a new user — username: WINDOWS, password: MyPass1234 — enabling the attacker to remotely log into the infected computer. The malware appears to be in development as new features are being added. Even though Seculert's researchers have had it under observation for around a month, its true aim remains unclear.

"We have seen several indications of features which are not yet implemented, and functions which are not yet used by the malware," Seculert staff explained in a blog post. "For instance, in case the attacker would like to open a browser on the victim’s machine, the malware will popup on the RDP session for the attacker a box with the message: 'TODO:Start browser!'

"This 'magic malware' — as we’ve dubbed it — is active, persistent and had remained undetected on the targeted machines for the past 11 months. Since then the attackers were able to target several thousands of different entities, most of them located in the United Kingdom."

The small and annoying irritant can also steal information and inject malicious HTML into a running web browser, we're told. However the "real intention of the attackers behind this magic malware … is yet to be known", according to Seculert.

At present the malware appears to be monitoring the activities of its targeted entities, but since it's readily capable of downloading and executing additional malicious files it might easily be activated at any time to launch a broader attack.

"This campaign has been active and under the radar for almost a year, targeting mostly UK entities," Aviv Raff, CTO of Seculert, told The Register. "Also, the malware seems to be still under development by the attackers."

Raff said that the malware appeared to be largely targeted a business users.

"During our research we have found that this persistent threat infected thousands of machines (mainly from the UK), targeting several different industries– including finance, education and telecoms," Raff explained. "We have also seen individuals being targeted, but because of the malware capabilities of remote access and hijacking web browsing sessions, we believe that those individuals are employees connecting from remote to corporate assets (e.g. outlook web access).

"The custom protocol of the malware requires a magic code for 'authentication'. The C2 server will only expose the commands for the infected machine, if the magic code will be provided at the beginning of the custom-protocol request." ®

Beginner's guide to SSL certificates

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.