'Nitro attacks' continue

Posted by   Virus Bulletin on   Dec 13, 2011

PoisonIvy trojan sent attached to email warning about the same trojan.

Researchers at Symantec report that the 'Nitro attacks', which target a number of large companies, many of which are active in the chemical industry, are continuing, using the same methods as before.

In the most recent part of this attack, employees of the targeted companies received emails containing a password-protected zip archive. The archive contained an executable (although the filename suggested it was a PDF document) which installed a variant of the PoisonIvy trojan. At the same time, a harmless PDF was dropped onto the victim's machine, apparently in an attempt to distract the user from the malicious installation that had taken place.

None of these techniques are new, nor are they very sophisticated. What is remarkable in this case is that the emails contained a warning against the PoisonIvy trojan itself and claimed that the attachment contained 'a special kill poison Ivy Trojan anti-virus software', apparently released by Symantec. The harmless PDF dropped onto the victim's machine was the very document Symantec published earlier about these Nitro attacks.

It is important for users to be aware of such attacks, especially if they target the industry they are working in. This example shows, however, that one should never blindly install software even if it is supposed to provide protection.

More at Symantec's blog here.

At the 3rd VB 'Securing Your Organization in the Age of Cybercrime' Seminar, Symantec.cloud's Martin Lee will talk about targeted attacks. The seminar takes place on 19 April 2012 at the OU Campus in Milton Keynes, UK; registration is now open.

Posted on 13 December 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Standalone product test: FireEye Endpoint

Virus Bulletin ran a standalone test on FireEye's Endpoint Security solution.

VB2017 video: Consequences of bad security in health care

Jelena Milosevic, a nurse with a passion for IT security, is uniquely placed to witness poor security practices in the health care sector, and to fully understand the consequences. Today, we publish the recording of a presentation given by Jelena at…

Vulnerabilities play only a tiny role in the security risks that come with mobile phones

Both bad news (all devices were pwnd) and good news (pwning is increasingly difficult) came from the most recent mobile Pwn2Own competition. But the practical security risks that come with using mobile phones have little to do with vulnerabilities.

VB2017 paper: The (testing) world turned upside down

At VB2017 in Madrid, industry veteran and ESET Senior Research Fellow David Harley presented a paper on the state of security software testing. Today we publish David's paper in both HTML and PDF format.

VB2017 video: Turning Trickbot: decoding an encrypted command-and-control channel

Trickbot, a banking trojan which appeared this year, seems to be a new, more modular, and more extensible malware descendant of the notorious Dyre botnet trojan. At VB2017, Symantec researcher Andrew Brandt presented a walkthrough of a typical…