A new e-mail worm masquerading as news headlines from CNN has the ability to log keystrokes and open backdoors for new threats, anti-virus vendor Sophos Inc. said in an advisory.
Researchers at Sophos said the worm, identified as W32/Crowt-A, takes its subject lines and message content from headlines gathered in real-time from Time Warners CNN Web site. The worms subject line and attachment share the same name, but continually change to mirror the front-page headline on the CNN site.
Once executed, Crowt-A installs a backdoor Trojan function that attempts to log keystrokes on infected PCs and sends gathered data to a remote user. Sophos warned that Trojans are often used by malicious hackers to hijack personal information such as bank passwords, Social Security numbers and credit card data.
The worm also attempts to send itself to e-mail addresses found on the infected computer.
To trick users into executing the file, the message text lifts legitimate news information direct from CNNs site. “Virus writers are always looking for new tricks to entice innocent computer users into running their malicious code; this latest ploy feeds on peoples desire for the latest news,” said Sophos security consultant Carole Theriault.
Theriault said virus writers are preying on the reality that many e-mail users subscribe to legitimate news updates, but she warned that enterprises should make sure their anti-virus detection is constantly updated. “Users need to be suspicious of all unsolicited e-mail, whether its promising celebrity pictures or news updates.”
Crowt-A copies itself to the SERVICES.EXE file in the Windows startup, templates and common program files folders, making the Windows startup folder a hidden folder at the same time. It sets entries in the registry at several locations to run the copies of itself on system startup, according to the Sophos alert.
The backdoor component connects by default on port 80 to a preprogrammed Web site and listens for instructions from a remote user. These instructions include changing the configuration-related registry setting, sending information about the infected computer, sending the users Windows address book, downloading files from remote locations, deleting files, rebooting the infected computer and setting up a command prompt that the remote user can control.
An infected machine can also be hijacked to act as a proxy server, to delete files from the Windows cookie folder and send virus-laden e-mails. “Some of these actions take place even without prompting from a remote user,” Sophos added.
Data gathered by the keystroke logger is automatically sent to a Yahoo e-mail address or to the remote user via the backdoor.
Next Page: New virus spoofs BitDefender address.
Page 2
Separately, IT security services firm BitDefender has distanced itself from a new virus that spoofs the “support@bitdefender.com” address. In a notice to customers BitDefender said the virus, dubbed Sticy.A, contains an IRC backdoor that prompts users to download malicious executables.
“We expect this to be the work of a bored Romanian student. … The whole setup is amateurish in the extreme. Nevertheless, we have been receiving about 20 bounced e-mails per minute, so I suspect the virus is spreading at a steady pace,” said BitDefender Chief Technology Officer Bogdan Dumitru.
“The hosting company of the Web site in question has been contacted and asked to remove the offending site. Users are strongly advised to not follow the link or download the executables in question under any circumstances whatsoever, to update their anti-virus with the latest virus definitions and to initiate a full scan of their computers at their earliest convenience,” the company said.
Check out eWEEK.coms for the latest security news, reviews and analysis.