Feeds

Researchers warn of resurgent Sefnit malware

Botnet returns using new tactics

Beginner's guide to SSL certificates

A malware infection which drew headlines January has returned and is using new techniques to infect and spread amongst users.

Known as Sefnit, the botnet infection was spotted in September of 2013 and triggered alarms earlier this year when researchers warned that millions of systems were likely infected with the malware. Associated with click fraud and bitcoin mining activities, Sefnit was noted for its use of the Tor anonymising network as a means of avoiding detection.

Microsoft researcher Jeff McDonald wrote at the time that the malware was using Tor to hide its command and control servers, directing traffic through the online network before connecting the infected machines with their control servers.

Now, according to researchers with Facebook, the Sefnit infection is back, albeit without the use of a Tor client. Security experts working with the social network spotted the infection spreading in the wild.

This time, say the researchers, the Sefnit malware is operating without the use of Tor, instead establishing direct connections via a secure Plink connection with one or more command and control servers. The malware, which initially tries to hide itself as a Windows Theme system file, operates as a pair of executables.

In a detailed roundup of the infection, the researchers are hoping to provide administrators and security teams with details which can help detect the the new code,which they say appears to have been developed in late March. The researchers listed thirty domains which have already been associated with the malware infections.

Once installed, the malware uses its control servers to receive orders or, download additional payloads.

Such a resurgence of a popular malware samples has been seen before. Often successful infections are repackaged and modified by their original authors or adopted by other cybercriminal groups for new attacks.

Popular kits such as the ZeuS malware have menaced users in for years while constantly changing or receiving tweaks to add new capabilities or avoid detection from antimalware tools and law enforcement groups. ®

Internet Security Threat Report 2014

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.