VoIP Business and Virtual PBX
Business

'Indestructable' malware infects 4.5m with Stuxnet efficiency

The TDSS malware, its forth incarnation dubbed TDL-4, dodged signature, heuristic, and proactive anti-virus detection, used a sophisticated rootkit, and encrypted communication between infected bots and its command and control centre.

Rootkit to operate on 64-bit systems

Its Russian-based creators are believed to be upgrading TDL-4 with a rootkit to operate on 64-bit systems, peer-to-peer research, an inbuilt "antivirus", MBR infection capability to run at system boot, and exploits used by Stuxnet.

The latest version as well contained revamped encryption. It had swapped the RC4 algorithm with custom built code that used XOR swaps and a bash parameter identifier to encrypted communication between infected bots and command and control servers.

The botnet will run smoothly

This "ensures that the botnet will run smoothly, during protecting infected computers from network traffic analysis, and blocking attempts of other cyber criminals to take control of the botnet", researchers said.

Infected machines talk over a private channel in the Kad peer-to-peer network, however it keeps a handful of infected machines in the public space as redundancy against attempts to hijack the botnet.

Tags:
More information: Crn.com
References:
  • ·

    Malware Encrypted Communication