Backdoor trojan unleashes dual-media attack

Security experts at MicroWorld Technologies have received reports about a text message being spammed to mobile phone users in US and parts of Canada, thanking them for subscribing to a nonexistent dating website that would charge them $2 per day. To unsubscribe the service you are told to visit a URL and follow the instructions.

The professionally designed website directs you to click on a button that says “unregister your mobile’. You are instructed to type in the mobile number in a textbox and click “confirm’ and subsequently a new window opens up telling you to run a program. The program is nothing but a deadly Backdoor Trojan named as Dumador.bc!

Dumador.bc is a Bot Trojan with keylogging capabilities. To connect to the remote attacker, it opens up dual TCP ports, communicating via “GET’ requests to multiple URLs. The Trojan also blocks websites of several AntiVirus firms by modifying the Windows “HOSTS’ file. The Keylogger component captures personal financial information pertaining to several leading banks and credit card companies, which are passed over to the malware author. Through the port, the attacker controls and manipulates the victim’s computer to eventually turn it into a zombie.
“Our users updating their software have no reason to worry as we’ve been providing protection for this Trojan ever since Apr 11, 2005,” informs Sulabh Mahant, Security analyst, MicroWorld Technologies. “What’s intriguing here is the bi-layered mode of proliferation with truly sophisticated Social Engineering. The thought of draining two dollars per day is good enough to make one panic. And the trick is all about inducing that state of mind where you lose senses and readily follow what the fraudster tells you to do”

Backdoor Trojans work surreptitiously in the background, while the infected user remains unaware of the hacker’s activities. Many a times they come bundled with popular games and utilities so as to arouse no suspicion what so ever. The person controlling the program can capture keystrokes, view files, steal screen shots and even work the mouse.

Botnets are created by grouping such infected computers, taken over by hackers using Backdoors and Trojans. These networks are employed in a plethora of illegal activities like Denial-of-Service attacks, hijacking SMTP Mail Servers to launch Spam campaigns, wrongfully increasing hit count of specific websites and proliferating deadly viruses.

Don't miss