Feeds

Beware Greeks bearing lists: Bank-raiding nasty Zeus smuggles attack orders in JPEGs

Trojan stashes config files in photos in mythology mash-up

Remote control for virtualized desktops

A new variant of the bank-account-raiding Zeus malware apparently uses the ancient technique of steganography to update its list of websites to subvert.

Dubbed ZeusVM, the crafty strain is just like its cousins in that it intercepts activity in a victim's web browser, siphons off passwords and other sensitive personal information to crooks, and can meddle with financial transactions to direct cash to crims' pockets.

But French security researcher Xylitol, who spotted the ZeusVM variant, was intrigued to discover a JPEG photo of a sunrise was being downloaded by the software nasty and hidden among the malware's files.

ZeusVM stays dormant much of the time to avoid detection, but when the user visits a website that's on the malware's list of targets – such as a particular online banking website, social network, web mail service, and so on – the code fires up and goes to work. It will then run in the background while the victim authenticates, firing off any logged secrets to its master, or carrying out transactions as required.

Xylitol tipped off security firm Malwarebytes, which analyzed the JPEG image and found it was being used to update the list of URLs that awakens the Trojan: the file included web addresses for Wells Fargo, Barclays and Deutsche Bank sites.

The only clue that the picture file, fetched from a server hosting the malware, is used to distribute updated target lists is that the JPEG has a larger-than-expected file size.

The extra bytes were run through Base64, RC4 and XOR algorithms and appended to the end of the image data by the Zeus controllers. It appears this chunk includes executable code that, when run, decrypts and unpacks the information into a readable Zeus configuration file.

Malwarebytes describes this as steganography; cynical Reg readers will call this concatenation.

Photos of sunsets aren’t high on the list to check for malware but in this case the technique effectively conceals program updates, and Malwarebyte reports seeing other malware authors increasing their use of the practice. This hiding-in-plain-sight technique is as old as the hills, but that's partially because it is so effective.

The first recorded case comes from Herodotus, who in 440BC recorded how Greek commanders wrote messages on wooden frames before filling them with wax and scratching on an innocent missive. The Greeks also wrote messages on couriers' shaven heads then let the hair grow back for concealment.

As technology has improved, so have the techniques. The invention of the microscope and fine tools allowed information to be transmitted via tiny messages shrunk into microdots, and the shift to digital media has made the practice even more effective.

It's not been widely used in the malware industry, despite its effectiveness, because it's relatively time-intensive to set up. But the ZeusVM sample shows the increasing attractiveness of the technique to obfuscate regular updates and adds one more thing for overworked security staff to check. ®

Intelligent flash storage arrays

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.