Virus Alerts, by Panda Security (http://www.pandasecurity.com)
Panda Security's report this week provides information about the
Singu.AM backdoor and the Goldun.TB and Sinowal.VTJ Trojans.
The Singu.AM backdoor copies itself on computers under the name
inetput.exe. When run, it installs itself as a computer service and
opens a port on the victim's computer, so the attacker can control it
remotely and carry out malicious actions: administer connections,
capture keystrokes, configure connection parameters, access the Windows
This malicious code is distributed through P2P networks. To tempt users
into downloading it, it uses social engineering techniques, passing
itself off as a fake program, an erotic photo, etc.
The Goldun.TB and Sinowal.VTJ Trojans are distributed in a similar way.
Goldun.TB reaches the victim's computer on an email attachment (photo
pretending to be an ICS warning (an incorrect abbreviation of IPCS:
Internet Service Provider Consortium), and indicating that the Internet
connection will be suspended due to the user's violation of alleged
The email attaches a supposed 6-month activity report which it refers to
in the message body. This report is compressed in a .ZIP file. If users
decompress and try to open the false report, they will be allowing a
copy of the Goldun.TB Trojan onto their computer.
The Sinowal.VTJ Trojan, on the other hand, reaches mailboxes in an email
pretending to come from a user who accuses the recipient of sending a
virus to his computer via email.
The email subject is "I am wait (sic) your reply"
(http://www.flickr.com/photos/panda_security/), and it has an attached
file it refers to in the email body, which supposedly contains proof of
the user's sending of malicious emails.
On opening the file (.ZIP format) and running the content (executable
file that looks like a PDF document), users will be entering a copy of
the Sinowal.VTJ Trojan onto their computer.
Once on the computer, this malicious code tries to download a
configuration file from a Russian domain, previously used to distribute
banker malware. It also releases a series of malicious files on the
"It is an ingenious social engineering technique. In both cases
cyber-crooks threaten users (cut off their Internet connection or take
legal action). This way, users are tempted into viewing the proof
against them, and on doing so, are infected," explains Luis Corrons,
technical director of PandaLabs.