New Trojan Targets Windows Systems - InformationWeek
04:45 PM
Moving UEBA Beyond the Ground Floor
Sep 20, 2017
This webinar will provide the details you need about UEBA so you can make the decisions on how bes ...Read More>>

New Trojan Targets Windows Systems

Phatbot uses known vulnerabilities to infect systems and can be used by attackers to steal information and control systems.

Computer-security companies warned Wednesday that a new malicious Trojan horse that targets Windows systems has been spotted on the Internet. Dubbed Phatbot, the Trojan was first noticed by antivirus companies earlier this week.

"We started getting reports of infections early Monday," says Craig Schmugar, a virus researcher with McAfee antivirus and vulnerability emergency-response team at Network Associates Inc.

Phatbot, which already has several variants, is leveraging a long list of software flaws to infect systems. According to security researchers, Phatbot scans for systems that have unpatched Windows vulnerabilities, including DCOM, DCOM2, locator service, network shares using weak passwords, WebDav, and the Windows Workstation Service. It will also attack systems already infected with the MyDoom worm.

Some variants of Phatbot can be controlled by attackers through Internet Relay Chat, while others can be controlled through peer-to-peer file-sharing technology.

Once the Trojan infects a system, it can try to use that system to send spam; steal Microsoft Windows Product Keys; kill previous infections of Blaster, Welchia, and Sobig.F worms; and steal Internet Relay Chat or IRC operator logon information and user names and passwords from FTP network traffic. It also can shut down common antivirus applications and block access to many antivirus vendor Web sites, Schmugar says. He says the majority of infections have so far occurred in Asia, with some in the United States.

Security vendor iDefense Inc. has spotted successful Phatbot infections, but Ken Dunham, director of malicious code, says it isn't the number of infected machines that's worrisome but the networks that are placed at risk with infected systems. "Large networks are clearly the target of this attack, as well as opportunistically attacking home users," he says.

Joe Stewart, senior security researcher at managed security services firm Lurhq Corp., says that while monitoring Phatbot he witnessed at least 1,000 infected systems in about an hour.

Because Phatbot doesn't cause an immediate and obvious problem, systems could remain infected for some time before users realize they have it. Most antivirus vendors have updated their antivirus signature files to spot Phatbot or soon will.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll