PandaLabs Discovers a New Briz Trojan
PandaLabs has detected the appearance of the new Briz.R Trojan. This Trojan allows an attacker to gain remote control of affected computers and redirect users to spoofed web pages designed to steal confidential data.
The origin of Briz.R is related to the scam of creating and selling customized versions of Briz detected and dismantled by PandaLabs a few months ago. Briz.R can reach computers through any means, including web pages, downloads of suspicious programs, etc. However, the author has not distributed it widely in order to try to avoid detection by security companies.
The Briz.R attack begins with the installation of a file called iexplore.exe, which serves to detect whether there is an Internet connection. If it detects a connection, it downloads another file called ieschedule.exe, which stores the configuration parameters of the Trojan, such as the port number through which it will send the information stolen.
Another component downloaded is ieserver.exe, which creates a web server on the computer. The function of this web server is to redirect the user to spoofed web pages, designed to steal personal data, when the user tries to access certain web addresses. Many of these web pages belong to online financial services. If the user enters data in the spoofed pages, the Trojan will steal it and send it to the cybercriminal.
This web server also allows the attacker to gain remote control of the affected computer. It does this by installing an application programmed in PHP called phpRemoteView.
Briz.R also downloads a component called smss.exe, which modifies the system hosts file. These modifications prevent access to a large number of web pages related to IT security.
TruPrevent proactive protection technologies have detected and blocked Briz.R without needing to be able to identify it first, and therefore, without needing the updates. For this reason, computers with these technologies installed have been protected from the moment this threat first appeared.
write your comments about the article :: © 2006 Computing News :: home page