Malware Outbreak During New Year – Dref-V and Trojan downloader Tibs-jy


Social Engineering again, someone praying on xmas spirit and good will to spread their filthy malware.

It quite often happens during festive times, someone hatches a new worm and sends it out packaged as a jolly xmas card or game.

A significant worm outbreak over the new year festivities has put paid to the notion we’ve seen the end of mass mailing worms just yet.

The Luder email worm (AKA Dref-V and Trojan downloader Tibs-jy, first seen on 30 December, poses as an electronic postcard and clogged up email in-boxes over the last two days after successfully duping the gullible into opening executable email attachments with names such as postcard and Greeting Card.exe. Subject lines such “Happy New Year!”, “Fun Filled New Year!” and “Happy 2007!” have been enough to convince the unwary that the messages were electronic greetings celebrating the new year rather than malware.

This time it’s about new year, but same old story packaged as a greeting card with rotated subject lines and various executable names.

Same concept as usual.

It’s far from the first instance of malware authors attempting to exploit seasonally dulled senses in a bid to spread malware. Two years ago a worm called Wumark-D spread across the net, net security firm Sophos notes. The attachment of infected emails launched a graphic image of nude men and women contorting to form the words “HAPPY NEW YEAR” whilst silently downloading malicious code onto compromised machines, which became agents in spreading the infection.

Once again a message for people to be vigilant, especially when receiving executables from anyone (even someone you know) unless you are expecting it.

Just drop a note back and ask did they mean to send it to you.

Source: The Register

Posted in: Malware

, , , , , ,


Latest Posts:


zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors
Memhunter - Automated Memory Resident Malware Detection Memhunter – Automated Memory Resident Malware Detection
Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving threat hunter analysis process.
Sandcastle - AWS S3 Bucket Enumeration Tool Sandcastle – AWS S3 Bucket Enumeration Tool
Sandcastle is an Amazon AWS S3 Bucket Enumeration Tool, formerly known as bucketCrawler. The script takes a target's name as the stem argument (e.g. shopify).
Astra - API Automated Security Testing For REST Astra – API Automated Security Testing For REST
Astra is a Python-based tool for API Automated Security Testing, REST API penetration testing is complex due to continuous changes in existing APIs.
Judas DNS - Nameserver DNS Poisoning Attack Tool Judas DNS – Nameserver DNS Poisoning Attack Tool
Judas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation.
dsniff Download - Tools for Network Auditing & Password Sniffing dsniff Download – Tools for Network Auditing & Password Sniffing
Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network


Comments are closed.