Malware descriptions

Detection for XCP software

Recently we’ve added detection for the stealth (rootkit) component of the XCP software to our bases as RiskWare. As you almost certainly already know, this software’s used by SonyBMG and developed by First4Internet to hide the DRM components. The reason we detect this component as RiskWare is that even though the program can be exploited by malicious users, there was no malicious intent by the developers of the program.

People were able to apply to download an uninstall tool from the SonyBMG site. However, for some time the application process meant that an ActiveX component (aka CodeSupport) would be installed on the user’s machine. This ActiveX component doesn’t get uninstalled afterwards and has been proven to be vulnerable to remote code execution.

We detect the stealth component as not-a-virus:RiskTool.Win32.XCP.a and not-a-virus:RiskTool.Win32.XCP.b. Although SonyBMG has changed their policy, and is working on a new uninstall utility, we also added detection for CodeSupport to our databases – not-a-virus:Downloader.Win32.CodeSupport.a.

Detection for XCP software

Your email address will not be published.



APT trends report Q1 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.

Lazarus Trojanized DeFi app for delivering malware

We recently discovered a Trojanized DeFi application that was compiled in November 2021. This application contains a legitimate program called DeFi Wallet that saves and manages a cryptocurrency wallet, but also implants a full-featured backdoor.

MoonBounce: the dark side of UEFI firmware

At the end of 2021, we inspected UEFI firmware that was tampered with to embed a malicious code we dub MoonBounce. In this report we describe how the MoonBounce implant works and how it is connected to APT41.

Subscribe to our weekly e-mails

The hottest research right in your inbox