Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    October 2014
    S M T W T F S
    « Sep    
     1234
    567891011
    12131415161718
    19202122232425
    262728293031  
  • About Us

    At 4:18 PM PST yesterday, Advanced Threats Researcher Ivan Macalintal discovered a spy-phishing scheme targeting the Fortune 500 company and 4th largest banking chain in the US, Wachovia Bank (NYSE: WB). This attack ends in the execution of a rootkit detected as TROJ_ROOTKIT.FX, which is a file that hides files and processes, allowing malicious attacks to run entirely beneath the radar.

    Macalintal warns that he has seen the following subject headings used in this attack:

    • Wachovia Connection Update Alert.
    • Wachovia Connection Customer Support – Security Updates.
    • Wachovia Connection upgrade warning.
    • Wachovia Connection Emergency Alert System.

    Below is a screenshot of a sample email:

    The malicious links download a file named SPlusWachoviadigicert.exe. Trend Micro Smart Protection Network detects this as TROJ_AGENT.AINZ. It accesses a certain URL to download another malware that in turn drops and installs TROJ_ROOTKIT.FX. This infection chain can be cut off at various points by the Smart Protection Network as we already detect the spam, the malicious links therein, and the files that are downloaded and executed on the system.

    Malicious rootkits are especially sneaky because they can hide processes and files from even tech-savvy users. This means entire attacks can transpire without the victim even guessing that there is something wrong with the PC. Malicious rootkits are often associated with information theft, and given that this spam appears to target Wachovia subscribers means that malware writers are counting on the chances that the victim’s PC contains critical financial information they can then collect for their own use.

    The legitimate Wachovia Security Plus link can be accessed here, where the company discusses several security issues and precautionary measures to avoid being tricked by these types of attacks.

    Related blog posts:

    We previously saw TROJ_ROOTKIT.FX a couple of weeks back in a phishing run targeting the Bank of America, as early as 8:35 AM EDT of September 9. Unlike phishing sites which are already harmful by themselves, these types of spam borrow legitimacy from online banking sites to deliver malware. The infection chain of the Bank of America attack starts with the download of an AGENT variant and, like this attack, ends in the initialization of TROJ_ROOTKIT.FX.

    Thanks to Jessa dela Torre of the Threat Response Team for the analysis of the infection chain.





    Share this article
    Get the latest on malware protection from TrendLabs
    Email this story to a friend   Technorati   NewsVine   MySpace   Google   Live   del.icio.us   StumbleUpon






     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice