Jump to content
Nytro

Kaspersky finds Malware that resides in your RAM

Recommended Posts

Kaspersky finds

Malware that resides in your RAM

Kaspersky+finds+Malware+that+resides+in+your+RAM.jpg

Kaspersky Lab researchers have discovered a drive-by download attack that evades hard-drive checkers by installing malware that lives in the computer's memory. The 'fileless' bot is more difficult for antivirus software to detect, and resides in memory until the machine is rebooted.

This Malware doesn't create any files on the affected systems was dropped on to the computers of visitors to popular news sites in Russia in a drive-by download attack.Drive-by download attacks are one of the primary methods of distributing malware over the web. They usually exploit vulnerabilities in outdated software products to infect computers without requiring user interaction.

The attack code loaded an exploit for a known Java vulnerability (CVE-2011-3544), but it wasn't hosted on the affected websites themselves. Once the malware infected a Microsoft machine, the bot disabled User Account Control, contacted a command and control server and downloaded the 'Lurk' Trojan. The malware also attacked Apple devices.

The Java exploit's payload consisted of a rogue DLL that was loaded and attached on the fly to the legitimate Java process.Normally this malware is rare, because it dies when the system is rebooted and the memory is cleared. But the hackers do not really care because there is a good chance that most victims would revisit the infected news websites.Once the malicious DLL loaded into memory it sends data and receives instructions from a command and control server over HTTP.

Sursa: Kaspersky finds Malware that resides in your RAM | The Hacker News (THN)

Link to comment
Share on other sites

De fapt un stealer este o aplicatie mult mai convenabila in prima faza. Pentru un botnet este necesar ca malware-ul sa descarce troianul si sa il instaleze, deoarece malware-ul rezida in memoria calculatorului doar pana cand calculatorul este inchis sau restartat. Acest tip de malware nu este persistent.

Link to comment
Share on other sites

Interesanta stire .

@iBebe , nedo de ce va complicati in termeni ? Scrie clar ca malware-ul din RAM dezactiveaza UAC-ul , dupa care descarca troianul " Lurk " , pe care evident il instaleaza . Troianul respectiv , probabil , poate sa faca orice : sa fure parole , sa creeze un botnet etc De ce ar fi lucruri diferite ? Am cautat pe Google, dar nu prea exista informatii despre respectivul troian ( Lurk ) pe care il descarca bot-ul rezident in RAM .

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...