Stories
Slash Boxes
Comments

SoylentNews is people

posted by on Monday March 06 2017, @12:48AM   Printer-friendly
from the clever dept.

Researchers at Cisco's Talos threat research group are publishing research today on a targeted attack delivered by a malicious Microsoft Word document that goes to great lengths to conceal its operations. Based entirely on Windows PowerShell scripts, the remote access tool communicates with the attacker behind it through a service that is nearly never blocked: the Domain Name Service.

The malware was first discovered by a security researcher (@simpo13) who alerted Talos because of one peculiar feature of the code that he discovered:alled out Cisco's SourceFire security appliances in particular with the encoded text, "SourceFireSux."

[...] The irony of this particular attack calling out SourceFire is that Cisco has just relaunched Umbrella—a service it acquired with OpenDNS—a product that is intended to shield from DNS exploits precisely like this.

Source:

https://arstechnica.com/security/2017/03/researchers-uncover-powershell-trojan-that-uses-dns-queries-to-get-its-orders/


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 3, Insightful) by jasassin on Monday March 06 2017, @01:19AM

    by jasassin (3566) <jasassin@gmail.com> on Monday March 06 2017, @01:19AM (#475445) Homepage Journal

    Why don't they bust the people who own the DNS servers? I must be missing something.

    --
    jasassin@gmail.com GPG Key ID: 0x663EB663D1E7F223
  • (Score: 0) by Anonymous Coward on Monday March 06 2017, @02:30AM

    by Anonymous Coward on Monday March 06 2017, @02:30AM (#475462)

    n/t

  • (Score: 2, Interesting) by anubi on Monday March 06 2017, @02:45AM (1 child)

    by anubi (2828) on Monday March 06 2017, @02:45AM (#475467) Journal

    And they found it apparently because of the phrase: "SourceFireSux".

    How many other malwares are out there, in place, primed.. sleeper cells... just waiting to be woke up?

    Contrary to what the DMCA as signed into effect by our Congress may say, ignorance is definitely NOT bliss!

    But most of us won't discover this until someone completely unknown to us pulls the rug out from under all of us.

    --
    "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]
    • (Score: 0) by Anonymous Coward on Monday March 06 2017, @10:59AM

      by Anonymous Coward on Monday March 06 2017, @10:59AM (#475568)

      ... and we will likely encounter this at the worst possible time ( outbreak of a war, for instance ).

  • (Score: 3, Interesting) by Nerdfest on Monday March 06 2017, @03:49AM (1 child)

    by Nerdfest (80) on Monday March 06 2017, @03:49AM (#475481)

    The irony of this particular attack calling out SourceFire is that Cisco has just relaunched Umbrella—a service it acquired with OpenDNS—a product that is intended to shield from DNS exploits precisely like this.

    Sounds more like marketing to me.

    • (Score: 0) by Anonymous Coward on Monday March 06 2017, @05:30AM

      by Anonymous Coward on Monday March 06 2017, @05:30AM (#475506)

      Marketing: PowerShell Trojan vs. Fitbit Smart Condom? I have a feeling we will be screwed either way since Micro$oft (Hey!!! Did you see I spelled Micro$oft with a $ instead of an actual "s"! Cool, eh!) is involved, and screwing newbs is what they do. Newbs and MCSEs. Newbs and MCSEs and PHBs. Newbs and MCSEs and PHBs and Francis. So sad. Microsoft has wiretapped the sacredness of an operating system, and all we are left with is a PowerShell of Trojan Horses filled with Greeks bearing Domain Addresses. So sick.

  • (Score: 0) by Anonymous Coward on Tuesday March 07 2017, @11:48AM

    by Anonymous Coward on Tuesday March 07 2017, @11:48AM (#475973)

    You did figure these expenses into your Total Cost of Ownership (TCO) calculation, right?

(1)