Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS \ Spyware ALERTS - October 24, 2008

Oct 23, 2008 3:06PM PDT

Discussion is locked

- Collapse -
Mal/AutoInf-A
Oct 23, 2008 3:07PM PDT
- Collapse -
Troj/PDFEx-AC
Oct 23, 2008 3:08PM PDT
- Collapse -
Troj/Dloadr-BWW
Oct 23, 2008 3:09PM PDT
- Collapse -
Troj/Dloadr-BWV
Oct 23, 2008 3:11PM PDT
- Collapse -
Troj/Agent-IAI
Oct 23, 2008 3:12PM PDT
- Collapse -
Troj/Agent-HZR
Oct 23, 2008 3:37PM PDT
- Collapse -
Troj/Banker-ENY
Oct 24, 2008 1:49AM PDT
- Collapse -
Troj/Bancos-BEQ
Oct 24, 2008 1:50AM PDT
- Collapse -
W32/Slugin-A
Oct 24, 2008 1:51AM PDT

Category Viruses and Spyware

Type Virus

W32/Slugin-A is a parasitic virus for the Windows platform.

When an infected file is run it drops a helper component WPlugin.dll into the <Application Data> and <Windows> folders. The host will operate normally giving no hint of an infection.

While running the virus provides backdoor functionality via a web interface which a remote attacker could use to further compromise the computer.

http://www.sophos.com/security/analyses/viruses-and-spyware/w32slugina.html?_log_from=rss

- Collapse -
Troj/ObfJS-E
Oct 24, 2008 1:52AM PDT
- Collapse -
Troj/JSDldr-A
Oct 24, 2008 1:53AM PDT
- Collapse -
Troj/Agent-IAM
Oct 24, 2008 1:55AM PDT
- Collapse -
Troj/Meredrop-B
Oct 24, 2008 1:56AM PDT
- Collapse -
Troj/JSDownL-P
Oct 24, 2008 1:57AM PDT
- Collapse -
Troj/AutoIT-AC
Oct 24, 2008 1:58AM PDT
- Collapse -
W32/Rbot-GXE
Oct 24, 2008 1:59AM PDT
- Collapse -
W32/Huhk-C
Oct 24, 2008 2:00AM PDT
- Collapse -
Troj/FakeAle-IV
Oct 24, 2008 2:01AM PDT
- Collapse -
Troj/Dloadr-BWX
Oct 24, 2008 2:02AM PDT
- Collapse -
Troj/Agent-IAO
Oct 24, 2008 2:03AM PDT
- Collapse -
Troj/Agent-IAN
Oct 24, 2008 2:04AM PDT
- Collapse -
Cinmus
Oct 24, 2008 2:05AM PDT
- Collapse -
Cain n Abel Installer
Oct 24, 2008 2:06AM PDT
- Collapse -
Casino
Oct 24, 2008 2:07AM PDT
- Collapse -
Trojan.Gimmiv.A
Oct 24, 2008 3:02AM PDT

Discovered: October 24, 2008
Updated: October 24, 2008 3:48:32 PM
Also Known As: Troj/Gimmiv-A [Sophos], Trojan-Spy:W32/Gimmiv.A [F-Secure], Win32/Gimmiv.A [Computer Associates], Gimmiv.A [Panda Software]
Type: Trojan

Trojan.Gimmiv.A is a Trojan horse that may steal information from the compromised computer.

Symantec Security Response is currently investigating this threat and will post more information as it becomes available.

http://www.symantec.com/business/security_response/writeup.jsp?docid=2008-102320-3122-99

- Collapse -
Virus Alerts, by Panda Security (http://www.pandasecurity.co
Oct 24, 2008 5:08AM PDT

This week's PandaLabs report deals with the BatGen.D malicious tool and
the Sinowal.VUW and YahooPsw.S Trojans.

BatGen.D is a tool used by cyber-crooks to generate malware.

Once run, the tool displays a short tutorial on how to create the
desired malware, starting with its name. Once named, the malicious code
is copied to c:\chosen_name.bat.

With this tool cyber-crooks can choose, just with a click, the malicious
actions to be performed by their creations on infected computers:
spread across P2P networks, infect .rar files, shut down the victim's
computer at random, etc You can see a photo of the console here:
http://www.flickr.com/photos/panda_security/2968157479/

"These tools make it extremely easy to create malware strains and they
are behind the current avalanche of malware, with an average of ten
thousand new malware strains detected every day", explains Luis Corrons,
Technical Director of PandaLabs.

The Sinowal.VUW Trojan, a member of the most dangerous malware families,
is designed to intercept applications and monitor Web pages visited. The
Internet addresses of these pages are compared to those of a Spanish
bank. If they match, the access credentials are stored and the user is
prompted to enter a set of banking data. This data is then sent to the
Trojan creator through a Web page.

Also, the Trojan installs a rootkit on the MBR (Master Boot Record, or
"zero sector") to avoid detection by security solutions.

YahooPsw.S reaches computers with a barcode icon. This Trojan is
designed to steal Yahoo!Messenger passwords. To do this:
* It acts as a keylogger.
* It captures screenshots.
* It logs mouse movements.
Data stolen are sent to several email addresses.
Finally, this week, PandaLabs has reported the relationship between the
stock market trends and malware. According to Panda Security's lab there
is a close relationship between the stock market decline and the malware
surge. More information at
http://www.pandasecurity.com/spain/homeusers/media/press-releases/viewne
ws?noticia=9407

- Collapse -
TROJ_VB.JBI
Oct 24, 2008 5:10AM PDT

Alert ID : FrSIRT/ALRT-2008-06430
Aliases : N/A
Size : 36954 bytes
Rated as : Low Risk
Release Date : 2008-10-24


Description

This Trojan arrives as a file downloaded from a certain URL. Upon execution, it drops a copy of itself and its components on the system. It modifies the system registry to enable its automatic execution at every system startup. It then attempts to access a certain Web site to download its configuration file. The said file contains information on where the malware can download an updated copy of itself, and on where it can send its stolen data. This configuration file also contains a list of targeted bank-related Web sites to monitor from which it steals information.

References

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_VB.JBI

Credits

Reported by Trend Micro

- Collapse -
Spy-Agent.da
Oct 24, 2008 5:12AM PDT

Alert ID : FrSIRT/ALRT-2008-06385
Aliases : N/A
Size : N/A
Rated as : Low Risk
Release Date : 2008-10-24


Description

The Spy-Agent.da detection includes payload files that are dropped as a result of Microsoft vulnerability MS08-067 in server service which allows for remote code execution.

References

http://vil.nai.com/vil/content/v_152898.htm

Credits

Reported by McAfee

- Collapse -
Trojan.Fakeavalert.B
Oct 24, 2008 5:16AM PDT
- Collapse -
Certificated Invoices ? Exploiting LNK extension
Oct 24, 2008 5:17AM PDT

October 24, 2008

In Germany we noticed a new massive wave of ?Rechnung? malware spammed mails continue today with a special scam inside.

The messages received today have diverse subject lines (?Abbuchung?, ?Lastschrift?, ?Amtsgericht?). The email bodies are also differently written, however have the same meaning ? the information that money have been debit directly from the user?s account.

More: http://blog.trendmicro.com/