'Nitro attacks' continue

Posted by   Virus Bulletin on   Dec 13, 2011

PoisonIvy trojan sent attached to email warning about the same trojan.

Researchers at Symantec report that the 'Nitro attacks', which target a number of large companies, many of which are active in the chemical industry, are continuing, using the same methods as before.

In the most recent part of this attack, employees of the targeted companies received emails containing a password-protected zip archive. The archive contained an executable (although the filename suggested it was a PDF document) which installed a variant of the PoisonIvy trojan. At the same time, a harmless PDF was dropped onto the victim's machine, apparently in an attempt to distract the user from the malicious installation that had taken place.

None of these techniques are new, nor are they very sophisticated. What is remarkable in this case is that the emails contained a warning against the PoisonIvy trojan itself and claimed that the attachment contained 'a special kill poison Ivy Trojan anti-virus software', apparently released by Symantec. The harmless PDF dropped onto the victim's machine was the very document Symantec published earlier about these Nitro attacks.

It is important for users to be aware of such attacks, especially if they target the industry they are working in. This example shows, however, that one should never blindly install software even if it is supposed to provide protection.

More at Symantec's blog here.

At the 3rd VB 'Securing Your Organization in the Age of Cybercrime' Seminar, Symantec.cloud's Martin Lee will talk about targeted attacks. The seminar takes place on 19 April 2012 at the OU Campus in Milton Keynes, UK; registration is now open.

Posted on 13 December 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker

An interview with VB2016’s keynote speaker Christine Whalley - Director, Governance and IT Risk Management at Pfizer

Throwback Thursday: Following the Breadcrumbs

In 1999, Christine Orshesky described how one large organization decided to find out how and where the viruses within it were being obtained so it could do more to protect its networks.

VB2016 preview: Cryptography mistakes in malware

At VB2016, two talks will discuss mistakes made by malware authors in cryptographic implementations. Ben Herzog and Yaniv Balmas will present a paper in which they look at a number of these mistakes, while Malwarebytes researcher hasherezade will…

GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016

Next month at VB2016, HPE Security's Oleg Petrovsky will speak about attacks on GPS. We conducted a short interview with Oleg and asked him about GPS, about the conference, and about his ultimate dinner party.

BSides Denver: Join and Support the Security Community

If you are coming to VB2016 in Denver, why not spend an extra day in the Mile-High City and join the free BSides Denver conference, which takes place on Saturday?