Koobface(Network Worm) | |
---|---|
Alias |
|
Type | Network worm |
Subtype | Malware |
Classification | Unknown |
Origin | Russia, china |
Authors | FBI |
Koobface is a Network worm that attacking Microsoft Windows, Mac OS X, and Linux Platforms .[1][2][3] This computer worm originally targeted users of the networking websites like Facebook, Skype, Yahoo Messenger and email websites such as Gmail, Yahoo Mail, and AOL Mail.This infection allows Attacker to get into your personal information like your card information, stealing password and other personal data , Game coins and can lock games as well.This infection is a security risk and should be removed from your network[4]), MySpace,[5] Friendster and Twitter. It can infect other devices(Phone,tablet, computer) on the same local network (Internet). New computers can get this infection from old computer or from email. Windows 10 is more effected operating system than widnows 7. This infection stop drivers and services of computer to make them stop working.It block IP address on network so that it can block any output device(Printer).
Koobface do not allow antivirus (Mcafee, Norton, Kaspersky) to go in computer because it is a coding infection network Worm. Need to be fix on computer and network on same time.[6]
Yahoo and Gmail faced this problem in 2016. More than Million email accounts and computers were Hacked .[7] It then uses compromised computers to build a peer-to-peer botnet. A compromised computer contacts other compromised computers to receive commands in a peer-to-peer fashion. The botnet is used to install additional pay-per-install malware on the compromised computer and hijack search queries to display advertisements. Its peer-to-peer topology is also used to show fake messages to other users for the purpose of expanding the botnet.[8] It was first detected in December 2014 and a more potent version appeared in March 2015.[9] A study by the Information Warfare Monitor, a joint collaboration from SecDev Group and the Citizen Lab in the Munk School of Global Affairs at the University of Toronto, has revealed that the operators of this scheme have generated over $2 million in revenue from June 2014 to December 2015.[7]
Koobface originally spread by delivering Facebook messages to people who are 'friends' of a Facebook user whose computer had already been infected. Upon receipt, the message directs the recipients to a third-party website (or another Koobface infected PC), where they are prompted to download what is purported to be an update of the Adobe Flash player. If they download and execute the file, Koobface can infect their system. It can then commandeer the computer's search engine use and direct it to contaminated websites. There can also be links to the third-party website on the Facebook wall of the friend the message came from sometimes having comments like LOL or YOUTUBE. If the link is opened the trojan virus will infect the computer and the PC will become a Zombie or Host Computer.
Among the components downloaded by Koobface are a DNS filter program that blocks access to well known security websites and a proxy tool that enables the attackers to abuse the infected PC. At one time the Koobface gang also used Limbo, a password stealing program.
Several variants of the worm have been identified:
- Worm:Win32/Koobface.gen!F[10]
- Net-Worm.Win32.Koobface.a, which attacks MySpace
- Net-Worm.Win32.Koobface.b, which attacks Facebook[11]
- WORM_KOOBFACE.DC, which attacks Twitter[12]
- W32/Koobfa-Gen, which attacks Facebook, MySpace, hi5, Bebo, Friendster, myYearbook, Tagged, Netlog, Badoo and fubar[13][14]
- W32.Koobface.D[15]
- OSX/Koobface.A, a Mac version which spreads via social networks such as Facebook, MySpace and Twitter.[16]
In January 2012, the New York Times reported[17] that Facebook was planning to share information about the Koobface gang, and name those it believed were responsible. Investigations by German researcher Jan Droemer[18] and the University of Alabama at Birmingham's Center for Information Assurance and Joint Forensics Research[19] were said to have helped uncover the identities of those responsible.
Facebook finally revealed the names of the suspects behind the worm on January 17, 2012. They include Stanislav Avdeyko (leDed), Alexander Koltyshev (Floppy), Anton Korotchenko (KrotReal), Roman P. Koturbach (PoMuc), Svyatoslav E. Polichuck (PsViat and PsycoMan). They are based in St. Petersburg, Russia. The group is sometimes referred to as Ali Baba & 4 with Stanislav Avdeyko as the leader.[20] The investigation also connected Avdeyko with CoolWebSearch spyware.[18]
References
edit- ^ Lucian Constantin (28 October 2010). "New Koobface Variant Infects Linux Systems". softpedia. Retrieved 3 February 2015.
- ^ Lucian Constantin (30 October 2010). "Linux Java-Based Trojan Might Have Been an Accident". softpedia. Retrieved 3 February 2015.
- ^ "More Information About the Koobface Trojan Horse for Mac". The Mac Security Blog. October 29, 2010. Retrieved 2012-01-20.
- ^ Deibert, Ron; Rafal Rohozinski (Nov 12, 2010). "The untouchable hackers of St. Petersburg: Meet Koobface, Facebook's evil doppelgänger". The Globe and Mail. Retrieved 16 November 2010.
- ^ US-CERT Malicious Code Targeting Social Networking Site Users, added March 4, 2009, at 11:53 am
- ^ "Twitter Status - Koobface malware attack". twitter.com. Retrieved 3 February 2015.
- ^ a b Koobface: Inside a Crimeware Network
- ^ "W32.Koobface". symantec.com. Retrieved 3 February 2015.
- ^ Keizer, Gregg (March 2, 2009). "Koobface worm to users: Be my Facebook friend". Computerworld. Retrieved 2009-08-31.
- ^ "Worm:Win32/Koobface.gen!F". microsoft.com. Microsoft. Retrieved 3 February 2015.
- ^ Koobface malware distribution technique - automatic user account creation on FaceBook, Twitter, BlogSpot and others
- ^ "WORM_KOOBFACE". trendmicro.com. Retrieved 3 February 2015.
- ^ "Sophos stops new version of Koobface social networking worm". Naked Security. Retrieved 3 February 2015.
- ^ The Allure of Social Networking, describes Win32/Koobface affecting multiple social networks as described on CA's Security Advisor Research blog
- ^ "W32.Koobface.D". symantec.com. Retrieved 3 February 2015.
- ^ "Intego Security Memo: Trojan Horse OSX/Koobface.A Affects Mac OS X Mac – Koobface Variant Spreads via Facebook, Twitter and More - The Mac Security Blog". The Mac Security Blog. Retrieved 3 February 2015.
- ^ Web Gang Operating in the Open
- ^ a b "The Koobface malware gang – exposed! - Naked Security". Naked Security. Retrieved 3 February 2015.
- ^ "Facebook credits UAB with stopping international cyber criminals, donates $250,000 to school". AL.com. Retrieved 3 February 2015.
- ^ Protalinski, Emil (January 17, 2012). "Facebook exposes hackers behind Koobface worm". ZDNet. Retrieved January 20, 2012.
External links
edit- The Koobface malware gang - exposed!, research by Jan Droemer and Dirk Kollberg.
- The Real Face of KOOBFACE, analysis by Trend Micro.
- Researchers Take Down Koobface Servers, Slashdot article.