'Nitro attacks' continue

Posted by   Virus Bulletin on   Dec 13, 2011

PoisonIvy trojan sent attached to email warning about the same trojan.

Researchers at Symantec report that the 'Nitro attacks', which target a number of large companies, many of which are active in the chemical industry, are continuing, using the same methods as before.

In the most recent part of this attack, employees of the targeted companies received emails containing a password-protected zip archive. The archive contained an executable (although the filename suggested it was a PDF document) which installed a variant of the PoisonIvy trojan. At the same time, a harmless PDF was dropped onto the victim's machine, apparently in an attempt to distract the user from the malicious installation that had taken place.

None of these techniques are new, nor are they very sophisticated. What is remarkable in this case is that the emails contained a warning against the PoisonIvy trojan itself and claimed that the attachment contained 'a special kill poison Ivy Trojan anti-virus software', apparently released by Symantec. The harmless PDF dropped onto the victim's machine was the very document Symantec published earlier about these Nitro attacks.

It is important for users to be aware of such attacks, especially if they target the industry they are working in. This example shows, however, that one should never blindly install software even if it is supposed to provide protection.

More at Symantec's blog here.

At the 3rd VB 'Securing Your Organization in the Age of Cybercrime' Seminar, Symantec.cloud's Martin Lee will talk about targeted attacks. The seminar takes place on 19 April 2012 at the OU Campus in Milton Keynes, UK; registration is now open.

Posted on 13 December 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Consumer spyware: a serious threat with a different threat model

Consumer spyware is a growing issue and one that can have serious consequences: its use is increasingly common in domestic violence. But do our threat models consider the attacker with physical access to, and inside knowledge of the victim?

VB2016 paper: Debugging and monitoring malware network activities with Haka

In their VB2016 paper, Stormshield researchers Benoît Ancel and Mehdi Talbi introduced Haka, an open-source language to monitor, debug and control malicious network traffic. Both their paper and the video recording of their presentation are now…

VB2017: a wide ranging and international conference programme

We are proud to announce a very broad and very international programme for VB2017, which will take place in Madrid, 4-6 October 2017.

John Graham-Cumming and Brian Honan to deliver keynote addresses at VB2017

Virus Bulletin is excited to announce John-Graham Cumming and Brian Honan as the two keynote speakers for VB2017 in Madrid.

Virus Bulletin says a fond farewell to John Hawes

As VB's COO John Hawes moves on to new challenges, the team wish him a fond farewell and good luck in his future endeavours.