Endpoint Protection

 View Only

Another Round of Peacomm Infections Underway 

Aug 14, 2008 07:08 PM

The Peacomm network has definitely turned out to be a survivor. With infections dating back to January 2007 and a P2P structure largely unchanged in about a year, Peacomm continues to evolve and infect new hosts. In early August our honeypots began capturing a new version of Peacomm. This iteration has been relatively low key as it propagates via users visiting infected Web sites, rather than by spam. Although Peacomm has been distributed via infected Web sites in the past, they were usually Web sites that were spammed to users as opposed to relying on drive-by downloading to gather its new recruits.

The attack toolkit used to install Peacomm in these drive-by attacks has changed as well. The infection begins with a user visiting an infectious Web site, which silently redirects the user to hostile content on a set of registered domains via an IFRAME. At this point, Kallisto TDS will serve a set of exploits against the victim. These include Acrobat PDF CollectEmailInfo, ANI Header Size, and MDAC.

Symantec IPS (NIS, NAV, N360, SEP, and SCS) will detect these attacks as follows with existing signatures:

HTTP ANI File Hdr Size BO

HTTP Malicious Toolkit Download Activity

HTTP MS Unsafe ActiveX Obj Instantiation

If a system were to become infected, the Peacomm P2P traffic will be detected as:

BD Peacomm Trojan - and the bot would be detected by antivirus as Trojan.Peacomm.

Message Edited by SR Blog Moderator on 08-14-2008 04:16 PM

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.