Incidents

Do you like photos?

This week we’ve seen a couple of IM-Worms peaking above the radar to an extent you can probably call epidemic levels.

Two of these were MSN-Worms. Each worm sends a link:

Each of the links lead to a different Trojan-downloader. The downloaders download a variety of adware and adware-related Trojans.

Moreover, IM-Worm.Win32.Licat.c is also downloaded, which in turn launches a new mass mailing of the original message. Nothing unusual, right?

Wrong! Both worms spread using links to .PIF files. But some of you might remember that Microsoft blocked messages containing “.pif”?

Yes they have, but… the MS block is case sensitive!

So the criminals used capital letters, “.PIF” and the network filters let the message flow right through. Other variations like .Pif, .pIf, and so on also work.

We have notified Microsoft of this and hope they take the necessary actions. In the meantime, users and admins should beware.

The funpic.de page has been taken down during the night and the uglyphotos link is dead and blocked by MSN. But there’s no doubt there will be new ones to replace it. Especially with the VML vulnerability still un-patched.

Do you like photos?

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Reports

Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs

Kaspersky GReAT experts dive deep into the BlueNoroff APT’s GhostCall and GhostHire campaigns. Extensive research detailing multiple malware chains targeting macOS, including a stealer suite, fake Zoom and Microsoft Teams clients and ChatGPT-enhanced images.

Mem3nt0 mori – The Hacking Team is back!

Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.

Mysterious Elephant: a growing threat

Kaspersky GReAT experts describe the latest Mysterious Elephant APT activity. The threat actor exfiltrates data related to WhatsApp and employs tools such as BabShell and MemLoader HidenDesk.