Google Groups Trojan Reveals Latest Trend in Malware
In an ongoing effort to evade malware detection, hackers have started to hide their 'command and control' instructions in legitimate sites like Twitter and Google Groups -- and with limited fear of being discovered.
Recent Google Groups Trojan
News of a recent attack broke after security specialists at Symantec followed a Trojan horse programmed to visit a private "Google Groups" newsgroup called escape2sun. After visiting the page, PCs were instructed to download encrypted instructions and software updates for malware.
Experts call these 'command and control' instructions and are used to communicate with infected PCs and to update malicious software. On the heels of this discovery, researchers learned that hackers are also hiding messages in RSS feeds that are set up to broadcast as "Twitter Tweets". (Source: yahoo.com)
Traditionally, only infected PCs would respond to the 'command and control' type of instruction found via IRC (Internet Relay Chat) servers or by hiding commands in obscure websites. The exodus away from this method and towards legitimate sites comes after the realization that more and more security programs are getting better at uncovering even the most remote websites.
Twitter, Facebook Not Likely Restricted
Restricting access to a malicious remote server is easy enough to do: once the site is blocked, the payload cannot be delivered. However, since the payload is now incorporated into legitimate domains such as Facebook and Twitter, restricting access to these legitimate sites becomes an improbable task.
It appears that Symantec detected the Trojan horse early enough because the prototype malicious script was merely used to gather information needed for future attacks. While that part may be good news, knowledge that such behavior exists also presents a preview into the disturbing, continuing relationship between hacker and social networking mediums. (Source: informationweek.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.