Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Crisis malware infects VMware virtual machines, researchers say

The Windows version of Crisis also infects Windows Mobile devices and USB drives

Article comments

The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, according to researchers from antivirus vendor Symantec.

Crisis is a computer Trojan program that targets Mac OS and Windows users. The malware was discovered by antivirus vendor Intego on July 24 and can record Skype conversations, capture traffic from instant messaging programs like Adium and Microsoft Messenger for Mac and track websites visited in Firefox or Safari.

Crisis is distributed via social engineering attacks that trick users into running a malicious Java applet. The applet identifies the user's OS - Windows or Mac OS X - and executes the corresponding installer.

"The threat searches for a VMware virtual machine image on the compromised computer and, if it finds an image, it mounts the image and then copies itself onto the image by using a VMware Player tool," said Symantec researcher Takashi Katsuki. "This may be the first malware that attempts to spread on to a virtual machine."

Morcut

Security researchers from antivirus vendor Kaspersky Lab, whose products detect the Crisis malware as Morcut, have confirmed the existence of this functionality in the Trojan program.

"This function allows Morcut to steal and intercept data from virtual machines including financial information used for online shopping," said Kaspersky Lab malware expert Sergey Golovanov.

Malware authors are putting significant efforts into making sure that new variants of their Trojan programs are not detected by antivirus products when they are released.

In response, some security conscious users are performing online banking, online shopping and other potentially sensitive activities from virtual machines. This allows them to use an OS installation that's unlikely to be altered by malware every time they need to perform such tasks.

Virtualised malware

Many malware threats contain routines that prevent their own execution inside virtual machines. This is done in order to prevent analysis by security researchers, who commonly use virtualised environments to observe what malicious programs do.

Morcut doesn't do this, Golovanov said. "Its aim is to get inside as many systems it can to steal the maximum amount of information."

"This may be the next leap forward for malware authors," Katsuki said.

In addition to infecting VMware virtual machines, the Windows version of Crisis also installs rogue modules on Windows Mobile devices connected to compromised systems.

HackingTeam connection

However, the Symantec researchers don't know what these modules do yet. "We currently do not have copies of these modules and hence we are looking for them so we can analyse them in greater detail," Katsuki said.

The number of computers infected by Crisis/Morcut is not very high at the moment. Kaspersky Lab has identified a total of 21 victims located in Italy, Mexico, Iran, Turkey, Iraq, Oman, Brazil, Kazakhstan, Kyrgyzstan and Tajikistan, Golovanov said. "This may not account for all the victims as other vendors may have detections on their systems too."

Security researchers from Intego previously said that sections of code from Crisis suggest a connection with a commercial Trojan program developed by an Italian company called HackingTeam and licensed to law enforcement and intelligence agencies for surveillance purposes.

The low number of infections and their wide geographic distribution could suggest that this malware is used in targeted attacks rather than widespread ones.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *