New Trojan Downloader Covers Tracks, Hard to Detect
Security researchers have discovered a new type of Trojan downloader capable of covering its tracks by deleting the files it downloads. That makes it harder for security experts to find and remove the downloader.
The downloader, which is called Win32 / Nemim.gen!A, shows how malware writers are producing progressively more sophisticated tools. By deleting all of the files it downloads and uses, this Trojan makes it almost impossible to recover, isolate, and analyze component files.
Sophisticated Malware Difficult to Confront
According to Microsoft Malware Protection Center researcher Jonathan San Jose, that makes it very difficult for security experts to deal with the Trojan.
"During analysis of the downloader, we may not easily find any downloaded component files on the system," San Jose said in a recent blog post.
"Even when using file recovery tools, we may see somewhat suspicious deleted file names but we may be unable to recover the correct content of the file." (Source: technet.com)
Microsoft says that the Trojan is designed to infect executable files in removable drives. By doing this, it can release a special tool capable of stealing passwords for email accounts, instant messenger accounts, and other services.
This Trojan downloader is also unique because it doesn't just deliver the core malware. Instead, the downloader remains a critical part of the operation even after a system has been infected.
Malware Artists Covering Their Tracks
According to Lumension forensic analyst Paul Henry, this is just another example of the unique steps being taken by malware artists to hide their tools from security researchers.
"Malware that covers its tracks to prevent the security community from developing quick defensive signatures is the norm today," Henry said. (Source: pcworld.com)
Indeed, just last week I reported on Trojan tool 'Trojan.APT.BaneChant,' (popularly known as 'BaneChant'), which tracks a user's mouse usage in order to evade automated antivirus systems.
Overall, it's clear that security professionals will need to adapt to changing circumstances.
"Your grandfather's security solutions will leave you utterly defenseless against today's evolving threats," Henry said.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.