Bitdefender has warned users of a malware targeted at Microsoft Outlook Web Access users. This malware cocktail has already infected three per cent of systems in Australia this month.
According to the company, the unsolicited message directs users to apply a new set of settings to their mailboxes to update several ‘security upgrades’ that have been applied. The link in the email leads to a web page with Microsoft Office logos that instructs users to download and launch an executable file that will supposedly update their email settings.
Instead, they receive a potent malware cocktail, including Trojan.SWF.Dropper.E, a generic detection name for a family of Trojans sharing similar behavior. They are Flash files, which usually do not display any relevant images/animations, but drop and execute various malware files (by exploiting Adobe Shockwave Flash vulnerability). The dropped files may be subject to change and different variants can drop and execute different malware programs.
Statistics showed a significant increase in the number of files worldwide that have been infected with Trojan.SWF.Dropper.E – an increase of nearly 60 per cent from December last year.
The attack also included other prolific malware, including:
- Trojan.Spy.ZBot.EKF, which was also intensively used into AH1N1-related malware distribution campaign. ZBot injects code into several processes and adds exceptions to the Microsoft Windows Firewall, providing backdoor and server capabilities. It also sends sensitive information and listens on several ports for possible commands from the remote attackers. The latest variants are also able to steal bank-related information, login data, history of the visited Web sites and other details the user inputs, while also capturing screenshots of the compromised machine’s desktop.
- Exploit.HTML.Agent.AM uses flash-object vulnerabilities that allow arbitrary code execution by loading a specially crafted flash object into a web page. Once an infected web page is opened, the Trojan creates a specially crafted SWF object which allows the execution of a payload into the heap (at the time this article was created, the downloaded file was detected as Trojan.Spy.ZBot.EKG; however, this may be subject to change).
BitDefender datasets also indicate a growing trend of Exploit.PDF-JS.Gen. The first two weeks of January showed that the most affected systems pertain to the United States, Spain and Canada.
In order to stay safe, BitDefender recommends that consumers never follow links inserted in messages from unknown contacts in addition to installing and updating a complete antimalware software solution.