Malware Outbreak During New Year – Dref-V and Trojan downloader Tibs-jy


Social Engineering again, someone praying on xmas spirit and good will to spread their filthy malware.

It quite often happens during festive times, someone hatches a new worm and sends it out packaged as a jolly xmas card or game.

A significant worm outbreak over the new year festivities has put paid to the notion we’ve seen the end of mass mailing worms just yet.

The Luder email worm (AKA Dref-V and Trojan downloader Tibs-jy, first seen on 30 December, poses as an electronic postcard and clogged up email in-boxes over the last two days after successfully duping the gullible into opening executable email attachments with names such as postcard and Greeting Card.exe. Subject lines such “Happy New Year!”, “Fun Filled New Year!” and “Happy 2007!” have been enough to convince the unwary that the messages were electronic greetings celebrating the new year rather than malware.

This time it’s about new year, but same old story packaged as a greeting card with rotated subject lines and various executable names.

Same concept as usual.

It’s far from the first instance of malware authors attempting to exploit seasonally dulled senses in a bid to spread malware. Two years ago a worm called Wumark-D spread across the net, net security firm Sophos notes. The attachment of infected emails launched a graphic image of nude men and women contorting to form the words “HAPPY NEW YEAR” whilst silently downloading malicious code onto compromised machines, which became agents in spreading the infection.

Once again a message for people to be vigilant, especially when receiving executables from anyone (even someone you know) unless you are expecting it.

Just drop a note back and ask did they mean to send it to you.

Source: The Register

Posted in: Malware

, , , , , ,


Latest Posts:


Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.


Comments are closed.