Custom Trojans – Isn’t it Old News?

The New Acunetix V12 Engine


Well it is for me, and I guess anyone who consider themselves a career hacker, or at least has a serious interest..

As a few good trojans are open source (Back Orifice?), you can just mess around with them for a while until you reach the point they are no longer detected by any of the major anti-virus suites, then bind then to a file and off you go, instant access.

I remember once, someone actually believed I’d sent them a notepad.exe upgrade version…oh well, if only everyone was that stupid it would make our jobs so much easier.

Anyone back to the point, it seems customized trojans and malware is being created for specific attacks.

Anti-virus companies employee legions of researchers, honey pots, and customers to find viruses as soon as they appear in the wild. It takes on average about six hours to find, classify, and push out a new definition to your desktop. The Achilles heel of the whole industry is that these research techniques can do nothing to protect you against a custom virus or Trojan.

Custom malware is easy to create. Take the source code of an existing Trojan or virus, and modify it so that existing anti-virus and anti-spyware programs do not recognize it. And even if you or your IT department finds the Trojan, it does no good to report it, because it is not “in the wild.” So the developer of the custom Trojan can reuse his wares against other targets.

Sadly as always the AV industry is way behind, your anti-virus software only works if it has the correct definition, heuristics in the AV field are still very weak.

Anti-virus software is still reactive, not pro-active.

The infamous Trojan developed by Michael Haephrati and used to steal competitive information from dozens of companies in Israel was a custom Trojan. Now China is engaging in industrial-scale fishing expeditions against U.K. businesses and government agencies using a two-pronged attack.

The routine goes like this: First, a custom virus is sent in to harvest email addresses. It stays only within the target domain. Then, emails are sent to those addresses containing the custom Trojan. The reply-to addresses all appear to be within the same organization, making them more likely to be opened. Would you not open an email from your boss that said “Annual Appraisal Attached, Open Immediately”?

Social engineering combined with a custom trojan and some neat code, blended threats are always the most effective.

Again things like this can be stopped with education, it’s very hard to protect against such things with currect technology.

Host based intrusion detection can go a little way to helping..

Source: Dark Reading

Posted in: Malware

, , , , ,


Latest Posts:


DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.
Acunetix Vulnerability Scanner For Linux Now Available Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.


2 Responses to Custom Trojans – Isn’t it Old News?

  1. Jeff September 12, 2006 at 11:46 pm #

    Just wanted to say hi and nice job on your website.

  2. Daniel June 4, 2007 at 9:11 am #

    even better is to look at the signatures in an open source AV program and change only those things. even small av products look for mainly the smae things as the biggies.