Asrokhel Posted November 18, 2012 Share Posted November 18, 2012 Windows 8 may block most malware out of the box, but there is still malware out there that thwarts Microsoft?s latest and greatest. A new Trojan variant, detected as Backdoor.Makadocs and spread via RTF and Microsoft Word document marked as Trojan.Dropper, has been discovered that not only adds a clause to target Windows 8 and Windows Server 2012, but also uses Google Docs as a proxy server to phone home to its Command & Control (C&C) server. Symantec believes the threat has been updated by the malware author to include the Windows 8 and Windows Server 2012 references, but doesn?t do anything specific for them (yet). This is no surprise: the two operating systems were released less than a month ago but of course they are already popular, and cybercriminals are acting fast. Yet the more interesting part is the Google Docs addition. Backdoor.Makadocs gathers information from the compromised computer (such as host name and OS type) and then receives and executes commands from a C&C server to do further damage. In order to do so, the malware authors have decided to leverage Google Docs to ensure crystal clear communications. As Google Docs becomes more and more popular, and as businesses continue to accept it and allow the service through their firewalls, this method is a clever move. The reason this works is because Google Docs includes a ?viewer? function that retrieves resources of another URL and displays it, allowing the user to view a variety of file types in the browser. In violation of Google?s policies, Backdoor.Makadocs uses this function to access its C&C server, likely in the hopes of preventing the link to the C&C from being discovered since Google Docs encrypts its connection over HTTPS. Symantec says ?It is possible for Google to prevent this connection by using a firewall.? Since the document does not leverage vulnerabilities to function (it relies on social engineering tactics instead) it?s unlikely Google will be able to do much beyond participating in a game of cat and mouse with the malware authors. Nevertheless, we have contacted Google and Microsoft about this issue. We will update this article if and when we hear back. Update at 4:30PM EST: ?Using any Google product to conduct this kind of activity is a violation of our product policies,? a Google spokesperson said in a statement. ?We investigate and take action when we become aware of abuse.? http://thenextweb.co...-to-phone-home/ Link to comment Share on other sites More sharing options...
carmatic Posted November 18, 2012 Share Posted November 18, 2012 "social engineering tactics" ? like , asking people to download and execute things? Link to comment Share on other sites More sharing options...
123456789A Posted November 18, 2012 Share Posted November 18, 2012 Would I be safe from this if my hosts file blocks google? Link to comment Share on other sites More sharing options...
Innuendo Posted November 18, 2012 Share Posted November 18, 2012 Yes, the exploit depends on the user downloading and then opening an infected RTF or Microsoft Word document. Link to comment Share on other sites More sharing options...
Growled Member Posted November 19, 2012 Member Share Posted November 19, 2012 If people would only pay attention to what they were downloading then none of this would happen. Link to comment Share on other sites More sharing options...
Recommended Posts