{"id":22449,"date":"2012-07-26T20:24:33","date_gmt":"2012-07-26T10:24:33","guid":{"rendered":"http:\/\/power-up.space\/?p=22449"},"modified":"2012-07-26T20:24:33","modified_gmt":"2012-07-26T10:24:33","slug":"cybercriminals-use-social-engineering-to-extend-lifecycle-of-malware-by-ensnaring-tech-savvy-users-with-plausible-scenarios","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=22449","title":{"rendered":"Cybercriminals use social engineering to extend lifecycle of malware by ensnaring tech-savvy users with plausible scenarios"},"content":{"rendered":"<p>AVG (AU\/NZ) Pty Ltd today released AVG Technologies\u2019 Q2 2012 Community Powered Threat Report. This quarter\u2019s report investigates how cybercriminals have combined social engineering with more complex malware authoring for PC and mobile to increase impact, and that many of these are emerging from China.<\/p>\n<p>Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share<a title=\"\" href=\"#_ftn1\">[1]<\/a> and is on track to stay the most shipped mobile operating system until 2016<a title=\"\" href=\"#_ftn2\">[2]<\/a>. Much of this new malware has also been identified as originating from China and targeting users there and in neighbouring markets, reflecting the fact that this is now the world\u2019s top smartphone market with over one million mobile web users<a title=\"\" href=\"#_ftn3\">[3]<\/a>.<\/p>\n<p><strong>The China connection <\/strong><\/p>\n<p>This quarter saw the introduction of the first Android bootkit, \u2018DKFbootkit\u2019, which masquerades as a fake version of a legitimate application and damages the smartphone\u2019s Linux kernel code by replacing it with malicious code. Users are tricked into clicking \u2018OK\u2019 to the notifications the malware provides, giving it permission to add itself to the boot sequence and spring into life once the device is activated. In rooting the device, this attack turns the smartphone into a zombie that is fully under the cybercriminal\u2019s control, which makes it a serious threat to Android users. This attack is spread over the third party applications market \u2013 and not the official Google Play &#8211; in China.<\/p>\n<p>Malware authors also spammed China, Japan, South Korea, Taiwan and the United States with Trojan-infected email messages related to political issues around Tibet.\u00a0 These were released on the back of a Microsoft \u2018Patch Tuesday\u2019 security bulletin<a title=\"\" href=\"#_ftn4\">[4]<\/a> with the authors rushing to take advantage of the \u2018window of opportunity\u2019 time lag between the patch release and when users were able to implement it. The email attachment contains an embedded encrypted executable file which collects sensitive user information such as passwords, and is able to download additional malware for key logger facility or to get a new Trojan configuration.<\/p>\n<p>Michael McKinnon, Security Advisor at AVG (AU\/NZ), said: \u201cIn AVG\u2019s experience, an operating system attracts attention from cybercriminals once it secures five percent market share; once it reaches ten percent, it will be actively attacked.\u00a0 It\u2019s no surprise therefore that our investigations uncovered a further upsurge in malware targeting Android smartphones given its sustained popularity, with new attacks focused on rooting the devices to give cybercriminals full control. What\u2019s new this quarter is the significant upsurge in these threats originating from China.\u201d<\/p>\n<p><strong>The end of antivirus?<\/strong><\/p>\n<p>For all of the sensationalism around the discovery of Stuxnet in 2010 and its 2012 equivalent, Flame, the average consumer was never actually a target for either malware. While rumours of cyber-attacks were circulated about both, Flame was actually not a patch on the sophistication of Stuxnet in terms of malware authoring and in particular, the techniques used in the payload were not very impressive. The security industry has already adapted to the unexpected nature of threats with traditional signature detection being just one layer within a multi-faceted security solution.<\/p>\n<p><strong>Consumer scams<\/strong><\/p>\n<p>The latest version of the LizaMoon mass injection SQL attack this quarter deceives users into downloading a Trojan or some rogue software by exploiting human interest and hiding inside non-existent celebrity sex videos or fake antivirus websites. Injecting malicious code into legitimate but vulnerable websites, this attack targeted Mozilla\u2019s Firefox browser and Microsoft\u2019s Internet Explorer with two attack vectors. In Firefox, users are lured by raunchy videos of socialite Paris Hilton and actress Emma Watson and asked to update their Flash installation in order to view them. Users never get to see the video as the malware installed is a Trojan disguised as a Flash update.<\/p>\n<p>In Internet Explorer, users receive a prompt seemingly from an antivirus website which would claim to have found malware on their computer. They are encouraged to download the malware and, once installed, to \u2018purchase it\u2019 which would then simply remove the malware in return for payment. Should the victim decide not to purchase, nag screens would pop up until the rogue was cleaned from the machine. In the most recent version, the malware was updated to enable \u2018drive-by downloads\u2019 where victims need only visit the website to become infected and it is no longer enough to close the web page to be safe.<\/p>\n<p>Rovio\u2019s \u2018<a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=ltWDM3d6Z2diEs-2BXXRbDYMNuoiGMN8Hkp81qcftQqWtPGRybmghVFV6iNVtGubjT8Kx806wqz1ie3S1jHuMp2w-3D-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrQyy8pFDNGSZg98bdRaned0UJyV-2Fmy574dKu7g4n2ltDjLo5Z-2FOWn-2FMAKgU9B6MmEy028hkuIBZaSK9Ib281OkvTOHo-2BfA3E8x16GK4Hoiztg-2FlQZNoc2ZJh7lBYgFr1OjKZHVTP6MZTkQt9lUx2y6Yp-2BPx2ruZE072i71y-2FOEjQ-3D\">Angry Birds Space\u2019<\/a> application was also frontline for consumer scams this quarter. Using the same graphics as the legitimate version, a fully functional Trojan-infected version was uploaded to unofficial Android application stores. It uses the GingerBreak exploit to root the device, gaining Command and Control functionality to communicate with the remote server to download and install additional malware, botnet functionality, and to enable the modification of files and launch of URLs.<\/p>\n<p>To download the full Q2 2012 Community Powered Threat Report, please visit:<a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=0a8tMEZqIEUfa6Swg2queC9BaKR4Nuuzt-2FREzXgOnyoVhzNdjb6Y-2BJUhodI-2FT3DRPFpyq6gBEWeE30P5AsNXwYL-2F4LT6efSFYsDgn7K95NmzJm7eBfv4cIvdpBOXKn9GWMTQskChvKoKNt-2B3W-2F6twwAO0FR0bwUng3pmYDssZN0-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrQyy8pFDNGSZg98bdRaned47E08Ike1zUZ87oZFSEaD8-2FV2ZrKpkiFwkYXcsRThCBUqtH5U7jR3t-2B4MIhZ8Fxts3gLT4RK7uCotpO1sX5qmFYx3vGDoPzamDFTY3cy5IzlVnQ68Kz0CQQ6CnmhBZ9zjiVdzE29h9AEGniwRGUDx8-3D\">http:\/\/mediacenter.avg.com\/en\/press-tools\/avg-threat-reports\/avg-community-powered-threat-report-q2-2012.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AVG (AU\/NZ) Pty Ltd today released AVG Technologies\u2019 Q2 2012 Community Powered Threat Report. This quarter\u2019s report investigates how cybercriminals have combined social engineering with more complex malware authoring for PC and mobile to increase impact, and that many of these are emerging from China. Android smartphone users remain a lucrative target as the platform<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=22449\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-22449","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/22449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=22449"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/22449\/revisions"}],"predecessor-version":[{"id":22452,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/22449\/revisions\/22452"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=22449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=22449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=22449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}