Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A click-fraud campaign has been launched using a new dangerous TDL-4 malware variant which has claimed some 280,000 victims.
The malware TDL-4 rose to infamy in 2011 when researchers discovered it supported a botnet of more than four million infected computers.
The latest version of the malware uses a domain-generation algorithm (DGA) in which the infected machines create thousands of domain names daily to hide command-and-control infrastructure.
Victims were caught in a money-making campaign where they were redirected from legitimate ads to URLs where attackers earn revenue off the traffic.
The malware variant emerged in May according to researchers at Damballa Labs, and had infected up to 30,000 machines in the past week.
Victims were usually unaware of the attack and researchers at Damballa and Georgia Tech Information Security Center did not know what types of fradulent ads were used.
“We are in the process of further analysing the ad campaign,” Damballa academic sciences director Manos Antonakakis said. “We have several people working to define what [attackers] are actually doing.”
More than 40 Fortune 500 companies are among the victims infected by the TDL-4 variant, as well as government agencies and ISP networks. Damballa also pinpointed 85 servers, hosted primarily in Russia, Romania and the Netherlands, that were linked to the botnet.
The attacks were centralised within the US, Germany and Britan, Antonakakis said.
The company described TDL4 as a multipurpose launching pad for other malware which could have other unknown features.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.