[LINK] www.ipv6.org.au/summit

Stilgherrian stil at stilgherrian.com
Sun Aug 31 19:31:55 AEST 2008


On 31/08/2008, at 7:09 PM, Rick Welykochy wrote:
> Stilgherrian wrote:
>> Having spent a day last week, and another day tomorrow, dealing  
>> with  the fallout from two users who opened the anonymous email  
>> with subject  "You've received a greeting ecard", clicked on the  
>> unmasked link to  an .exe file in a random domain and then, when  
>> asked what to do with  the file, clicked on "Run"... having  
>> considered this, I believe the  discussion of whether NAT does or  
>> does not improve security to be  completely irrelevant kthxbai.
>
> I have received many of these emails. I downloaded the .exe out of
> curosity to see what kind of file it was. Couldn't get any further on
> the Mac (of course).
>
> What damage does this one do, Stil?

Oh, this one is sweet... though I suspect what I'm about to describe  
is "typical" rather the the same each time. The .exe is Trojan.Srizbi  
which in this case installed three components.

One is the screensaver Joke.Blusod, which throws up fake a Blue Screen  
of Death and, when you escape out of it, plays an animation of a  
Windows restart and then, once back at the desktop, pops up a  
convincing "Windows has encountered a serious error" dialog. After a  
couple of these, the user is suitably paranoid.

The second piece is an application "Antivirus XP 2008" which is set to  
auto-run on Windows start. After a delay, it pops up a window with a  
convincing-looking anti-virus scan and then a message that your  
computer is infected. If you click on the button to disinfect, it says  
your copy is not registered, and the register button takes you to a  
website where you can conveniently enter your credit card details.  
Identity Theft R Us.

One user got as far as *almost* doing this before she thought that  
their anti-virus software would have been registered already, and she  
finally became suspicious.

All in all, though, a nice bit of social engineering once installed.

Meanwhile, the third component is a rootkit to totally own the  
machine. Only one of the two machines had this, so I suspect this is  
only loaded once the hijacked computer reports back to its mothership.  
Or maybe the rootkit didn't work on the other because the two machines  
are configured differently. Either way, the machine which did get  
rooted soon started sending spam.


> I really hear you regarding the above sequence of events with naive  
> users.
> With behaviour like that, all bets are off. Did you recommend these  
> two
> users find the box the machine came in and return it pronto?

Sadly that's outside my brief. ;)

However, in the users' defence, they did say that "It wasn't  
spam" (i.e. the ISP spam filter hadn't tagged it), and they DO have  
other people sending them ecards occasionally. [shrugs]

Stil


-- 
Stilgherrian http://stilgherrian.com/
Internet, IT and Media Consulting, Sydney, Australia
mobile +61 407 623 600
fax +61 2 9516 5630
Twitter: stilgherrian
Skype: stilgherrian
ABN 25 231 641 421




More information about the Link mailing list