Worm can infect Windows system via PDF vulnerability
TipsMake.com - According to the latest research of X Force security group under IBM Internet Security Systems, security holes in PDF files will help hackers easily put malware inside Windows system . That is the appearance of the ZeuS bot, but without stopping there, this security hole also contains another potential danger - the worm.
The code or executable files in the form of * .exe that are embedded in PDF files will be activated when users use the Launch Actions / Launch File function. Although Adobe Reader has issued a message asking if the user wants to execute the files, those messages have been changed so that users are not suspicious or aware of what will happen to them. their system.
Collected from a variety of sources, including X-Force's report, it is now spreading spam mailboxes with the same title as " Setting for your mailbox are changed ". Emails like this mention that users should open the attached PDF file for complete instructions and details about reconfiguring their email account. And many people have accidentally fallen into this dangerous trap when believing in the announcement and opening the attached PDF file. As a result, malicious code in the PDF file immediately creates the game.exe file and executes it in the user's system.
Below is a preliminary description of hackers attack tactics:
Spam emails contain malicious code when users open
The target is the Microsoft Windows operating system. When the user opens the PDF file, they immediately activate the cmd.exe application, with the purpose of calling out two scripts.vbs and batscript.vbs:
When opening the PDF file, the user will see the following bulletin board appear, but has been cleverly disguised with gaps as shown below:
But when pulled up, users will see the full message as follows:
Of course, if they want to be activated, they must have an impact from the user, and the hackers have carefully 'lured' them with the above 'secure' information. Users just need to select ' Open ', the embedded malicious code will immediately create a strange file named game.exe with the following form:
The script.vbs script contains the executable file (this is game.exe ), encoded into VBS string. This process is really confusing and confusing, but the value 077, 090 is actually ASCII standard encoding of two characters M and Z, this is the first 2 bytes of any * .exe file of the executable. Microsoft Windows platform:
This code continues to do the writing of strings into files:
The next code ( batscript.vbs ) will execute this game.exe file. This is actually another variant of a worm known as Win32 / Auraax or Win32 / Emold . It will automatically copy to C: Program FilesMicrosoft Commonsvchost.exe , and then, use the HKLMMicrosoftWindows NTCurrentVersionImage File Execution Optionsexplorer.exe key , to install itself into the debug application of explorer.exe, and of course it will automatically Dynamic is activated when the user boots the Windows system. At the same time, it also automatically creates 1 rootkit driver to replace the asyncmac.sys file in the system. Besides, part of this malware will continue to spread, copying itself to other partitions of the entire drive (including mobile devices) with the autorun mechanism, it will automatically create files. autorun.inf and system.exe on every partition it finds, set and adjust the necessary parameters of autorun.inf to automatically activate the system.exe process.
But actually the problem only occurs when users do not pay attention to the suspicious bulletin board, so Adobe does not rank this vulnerability in a serious manner. Adobe thinks that a useful function only becomes dangerous when users use it incorrectly.
You should read it
- Warning virus similar to Stuxnet 'computer worm'
- Will the Kama Sutra worm come back next week?
- New virus outbreaks occur via USB
- Overview of sample Net-Worm.Win32.Kido.ih
- 'Virus battle' causes more than 250,000 errors
- Viruses spreading files appear strong in April
- Virus appears to attack Twitter users
- The first virus in PSP
May be interested
- Prevent virus wmpscfgs.exethere are a lot of problems when task manager always displays the wmpscfgs.exe application, but does not do anything to turn it off, and has a lot of troubles.
- New worms appear to attack both Yahoo! Messenger, Skypejust days after the worm spread through yahoo! messenger broke out, the internet emerged a more sophisticated new worm targeting both skype and yahoo! messenger
- Trojan hidden in Compatibility Checker Windows 7, Safari sticks to security errorsa type of trojan hidden in the system to check the compatibility of the system with windows 7 has just been discovered.
- Conficker worm still raging in TM Datacenter data centercalled conficker, the type of computer sieves spread across millions of computers around the world and left tremendous consequences.
- Symantec announced 100 dirty websites in 2009in the list of the 100 most dirty websites of 2009 that symantec listed, most of them are fake antivirus software websites.
- Koobface worm exploded in the Christmas seasonsecurity companies have warned about the abuse of the koobface worm to attack social networks, especially facebook, to steal user information on computers.