Sefnit Trojan endangers users even after removal
Posted on 10.01.2014
Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it?

It was later discovered that the spike happened due to Mevade bots getting equipped with a component that used Tor for C&C communication. Also, that the Mevade threat is an old one: the Sefnit click-fraud Trojan that has been around since 2009.


This rapid rise in Tor connections has served to see just how many computers were infected with the malware, and the number was staggering: over four million.

Since then, Microsoft has been working to diminish that number. The company started by adding signatures to its security solutions for detecting and removing these new Sefnit versions from computers running Windows.

But the Tor component was not initially removed, and put users in danger of having their computers compromised by those and other attackers.

"The Tor client service left behind on a previously-infected machine may seem harmless at first glance - Tor is a good application used to anonymize traffic and usually poses no threat," shared Microsoft antivirus researcher Geoff McDonald in a blog post. "Unfortunately, the version installed by Sefnit is v0.2.3.25 and does not self-update."

While there are no current high-severity vulnerabilities affecting this version, Tor has a history of such vulnerabilities being discovered, and many of them allow attackers to execute malicious code on the targets' computers.

"This Tor service is a security risk to the machines even after Sefnit has been removed, since it is probable that a serious security vulnerability will be identified in the future. In summary, this means that a malicious actor may be able to infect millions of machines with any malware at some point in the future," writes McDonald.

So, Microsoft has decided to retroactively clean the machines that still had the Sefnit-added Tor service, and practically managed to do so for half of them - around 2 million - in just two months (click on the screenshot to enlarge it):


But while two million cleaned computer is better than none, two million more remain at risk.

Many of these unreached machines probably not running Microsoft security software, so the only thing left to do is to either install and use one of those solutions, or remove the Tor component manually.

In order to help these users, Microsoft has compiled a short step-by-step guide on how to do it.









Spotlight

People will do anything for free Wi-Fi

Posted on 30 September 2014.  |  A new Wi-Fi investigation conducted on the streets of London shows that consumers carelessly use public Wi-Fi without regard for their personal privacy.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //