UPDATED 14:22 EDT / AUGUST 22 2012

NEWS

Symantec Warns That Crisis Malware Infects VMware Virtual Machines

Back in July, security firm Symantec discovered a new malware that’s been attacking Macs dubbed as OSX.Crisis.

Crisis is described as a Trojan “that installs a back door on compromised OSX systems” which enables attackers to monitor programs such as Adium, Mozilla Firefox, MSN Messenger (for Mac) and Skype.  The malware is then able to record traffic on MSN Messenger (for Mac) and Adium, record Internet usage on Safari or Mozilla Firefox, capture or record Skype sessions, and send confidential information to a command-and-control (C&C) server through a back door (176.58.100.3x) and receive commands.
Kaspersky, another top security firm, backed up Symantec’s findings and stated that the malware was “distributed using social engineering techniques via a JAR file with the name AdobeFlashPlayer.jar and allegedly signed by VeriSign Inc.”

According to Sergey Golovanov, a Kaspersky Lab Expert, if the JAR file is allowed to run, “it creates an executable file payload.exe (993,440 bytes) in a temporary folder ~spawn[selection of numbers].tmp.dir and launches it.”  After it launches, “the malicious program initializes its components and passes control to them.”

The malware thought to be exclusive to Macs was soon discover to be capable of infecting Windows PCs as well as the JAR file contains two executable files for both Mac and Windows.  The malware first checks what OS the computer has then drops the appropriate bomb.

According to the latest findings, the malware has three methods of spreading infection: first is to copy itself and an autorun.inf file to a removable disk drive, second is to sneak onto a VMware virtual machine, and the third is to drop modules onto a Windows Mobile device.

The most interesting method is infecting virtual machines.  What happens with this is that the malware “searches for a VMware virtual machine image on the compromised computer and, if it finds an image, it mounts the image and then copies itself onto the image by using a VMware Player tool.”

Symantec stated that this may be the first time malwares are infecting virtual machines as malware usually terminate itself when it comes across virtual machines to avoid being analyzed.  Symantec recognizes the fact that this could be the next trend in malware authoring.

As for spreading in mobile devices, iOS and Android users can breathe easily for now as Crisis uses the Remote Application Programming Interface (RAPI) which only allows it to infect Windows Mobile devices.  But who knows?  If malware authors found a way to infect virtual machines, they’re sure to find a way to infect other mobile operating systems.  Hopefully, security experts would be up to par.


A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU