After a quiet 2011, where botmasters failed to come up with anything new, 2012 started with a bang.
According to Kaspersky Lab’s malware report for the first quarter of 2012, cybercriminals used a “fileless” bot to build a zombie-net for the first time. The team also saw the discovery of a mobile network with infection numbers similar to typical Windows botnets, and a zombie net of 700 000 Mac OS X computers were exposed.
“Among the growing malware problems for Macs, we saw the rise of targeted attacks against this OS,” the report reads. “Users need to be alert to the risk of cybercriminals targeting organisations which use both Windows and Mac platforms.
“In the first quarter of 2012, one case involved cybercriminals using two Trojans – one for Mac and another for Windows – to gain access to confidential records. Depending on which OS was running on the target machine, the appropriate malware was loaded. Both Trojans got their commands from a single control centre. To make the initial intrusion into the system, the criminals used an exploit that works in both Windows and Mac OS X environments; a successful attack gave them control over the infected machine.”
Yury Namestnikov, senior malware analyst at Kaspersky Lab, and author of the report, comments: “Judging by the speed with which new malware is being created for targeted attacks on Mac OS X, it is not that complicated for cybercriminals to develop. Meanwhile, the careless attitude of many Mac users, coupled with a lack of security on their computers, makes Macintosh the weakest link in business security systems.”
After a four-month break the authors of Duqu got back to work – in Q1 a new Duqu driver with functions similar to previous versions was detected. The difference in the code was negligible; all the changes were aimed at evading detection. The main Duqu module related to the driver has not yet been found.
“We were right in our suppositions – when so much money has been invested in a project, as it was with the development of Duqu and Stuxnet, it is impossible to suddenly just halt that process. Instead, the cybercriminals are persevering as usual – they have changed the code so it avoids detection and will continue to attack,” says Alexander Gostev, chief security expert at Kaspersky Lab.
The first quarter of 2012 was also notable for the successful joint efforts of antivirus companies and law enforcement bodies – they took over control of the 110,000-strong Hlux (Kelihos) botnet, shut down control centres of several ZeuS botnets targeting online banking users and arrested several Russian cybercriminals.