Home Business IT Security Russian hackers attack anti-US supporters

Russian hackers attack anti-US supporters Featured

Subscribe now and get the news that matters to your industry.

* Your Email Address:
* First Name:
* Last Name:
Industry:
Job Function:
Australian State:
Country:
Email marketing by Interspire
weebly statistics

A Russian self-proclaimed hacker community is stealing user data by pretending the software was designed to attack Western governments and the US, according to researchers.

Reports out today are suggesting that due largely to the ongoing Ukrainian conflict hackers have crafted specially targetted spam messages to deliver a trojan that "supports the Russian cause" and dislikes measures taken against the country.

Users who click the malicious links are unwillingly joining the botnet and spreading the malware further.

The news comes from researchers from security software Bitdefender, who said the Trojan drops three clean files used for traffic monitoring (npf_sys, packet_dll, wpcap_dll) and is capable of mining sensitive browser data, internet traffic and other personal information.

After clicking the links, victims download an executable file known as Kelihos. The Trojan communicates with the command and control center by exchanging encrypted messages via HTTP to retrieve further instructions.

Bitdefender said depending on the type of payload, Kelihos can do any of the following:

· Communicate with other infected computers

· Steal bitcoin wallets

· Send spam emails

· Steal FTP and email credentials, but also login details saved by the browsers

· Download and execute other malicious files on the affected system

· Monitor traffic for FTP, POP3 and SMTP protocols

“We, a group of hackers from the Russian Federation, are worried about the unreasonable sanctions that Western states imposed against our country,” malicious messages read.

“We have coded our answer and below you will find the link to our program. Run the application on your computer, and it will secretly begin to attack government agencies of the states that have adopted those sanctions.”

The Bitdefender Labs analysed one of the recent malicious spam waves and noticed that all the .eml files lead to setup.exe links, with five unique IPs. Three belonged to Ukraine, while the other two were retrieved in Poland and the Republic of Moldavia.

“Some might be servers specialised in malware distribution or other infected computers that became part of the Kelihos botnet,” Bitdefender Virus Analyst Doina Cosovan said.

“It is somehow ironic that most of the infected IPs are from Ukraine. This either means that computers in the country were also infected, or that Ukraine itself is where the distribution servers are located.”

To convince many users of their authenticity, the Russian hackers claim their program works silently, using no more than 10 to 50 megabytes of traffic per day, and takes almost no CPU time.

“After rebooting your computer, our program will terminate its activities, and if you want to - you can run it again,” spam e-mails also read. “If necessary, turn off your antivirus at that time.”

“Of course, turning off your security solution is not advisable. Instead, keep it installed and updated, just like your other software and operating system because malicious programs usually take advantage of vulnerabilities found in non-updated software,” said Cosovan.

Also known as Hlux, the Kelihos botnet was discovered four years ago and is mainly involved in the theft of bitcoins and spamming. The botnet has a peer-to-peer structure, where individual nodes can act as command-and-control servers for the entire botnet, increasing its longevity.

In January 2012 a new version of the botnet was discovered, and Microsoft pressed charges against a Russian citizen who was the alleged creator of the Kelihos Botnet’s sourcecode.

PROTECT YOURSELF AGAINST BANDWIDTH BANDITS!

Don't let traffic bottlenecks slow your network or business-critical apps to a grinding halt. With SolarWinds Bandwidth Analyzer Pack (BAP) you can gain unified network availability, performance, bandwidth, and traffic monitoring together in a single pane of glass.

With SolarWinds BAP, you'll be able to:

• Detect, diagnose, and resolve network performance issues

• Track response time, availability, and uptime of routers, switches, and other SNMP-enabled devices

• Monitor and analyze network bandwidth performance and traffic patterns.

• Identify bandwidth hogs and see which applications are using the most bandwidth

• Graphically display performance metrics in real time via dynamic interactive maps

Download FREE 30 Day Trial!

CLICK TO DOWNLOAD!

ITWIRE SERIES - IS YOUR BACKUP STRATEGY COSTING YOU CLIENTS?

Where are your clients backing up to right now?

Is your DR strategy as advanced as the rest of your service portfolio?

What areas of your business could be improved if you outsourced your backups to a trusted source?

Read the industry whitepaper and discover where to turn to for managed backup

FIND OUT MORE!

David Swan

David Swan is a tech journalist from Melbourne and is iTWire's Associate Editor. Having started off as a games reviewer at the age of 14, he now has a degree in Journalism from RMIT (with Honours) and owns basically every gadget under the sun. He also writes for Junkee and Fasterlouder. You can email him at david.swan@itwire.com or follow him at twitter.com/mrdavidswan

Connect