Feeds

Show Mother Russia you love her: Click HERE and AHHH NYET!

That Kelhios badness is infecting you - securobods

Secure remote control for conventional and virtual desktops

Software being offered to patriotic Russians as a way to attack Western governments, especially the US, is actually loaded with malware that attacks supporters' computers, security researchers warn.

Hackers have crafted ingenious spam messages that help them deliver the Trojan to those who support the Russian cause and are opposed to economic sanctions taken against their country over the conflict in the Ukraine. Users who click the malicious links are unwillingly joining a botnet, Romanian security firm BitDefender warns.

According to Bitdefender’s Russian-speaking antispam researchers, the malicious messages state: “We, a group of hackers from the Russian Federation, are worried about the unreasonable sanctions that Western states imposed against our country. We have coded our answer and below you will find the link to our program. Run the application on your computer, and it will secretly begin to attack government agencies of the states that have adopted those sanctions.”

After clicking the links, victims download an executable that is actually the Kelihos Trojan. The Trojan communicates with the command and control centre by exchanging encrypted messages via HTTP to retrieve further instructions.

Kelihos can communicate with other infected computers, steal Bitcoin wallets, send spam emails, steal login credentials as well as downloading and execute other malicious files on the affected system.

The Kelihos botnet, discovered four years ago, has a peer-to-peer structure where individual nodes can act as command-and-control servers for the entire botnet, increasing its longevity by making it harder to dismantle. BitDefender has identified download nodes in the Ukraine, Poland and the Republic of Moldavia.

“It is somehow ironic that most of the infected IPs are from Ukraine," said Doina Cosovan, a virus analyst at Bitdefender. "This either means that computers in the country were also infected, or that Ukraine itself is where the distribution servers are located.”

Inviting internet users to download hacking tools to launch attacks at enemies to a particular cause was a tactic regularly used by Anonymous, especially in its early days.

The Low Orbit Ion Cannon (LOIC) tool it initially recommended gave away users' IP addresses, leading to the arrest of various suspects. The tactic is far from limited to Anonymous and has also cropped up in online skirmishes featuring Palestinian and Israeli protagonists, for example. ®

Beginner's guide to SSL certificates

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?