{"id":1445,"date":"2009-10-16T00:01:21","date_gmt":"2009-10-16T07:01:21","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=1445"},"modified":"2018-01-30T13:18:03","modified_gmt":"2018-01-30T20:18:03","slug":"trojan-uses-commercial-firewall-to-block-av-updates","status":"publish","type":"post","link":"https://www.webroot.com/blog/2009\/10\/16\/trojan-uses-commercial-firewall-to-block-av-updates\/","title":{"rendered":"Trojan Uses Commercial Firewall to Block AV Updates"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2002.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2009\/10\/16\/trojan-uses-commercial-firewall-to-block-av-updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2012.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates&amp;title=Trojan%20Uses%20Commercial%20Firewall%20to%20Block%20AV%20Updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2022.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates&amp;title=Trojan%20Uses%20Commercial%20Firewall%20to%20Block%20AV%20Updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2032.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates&amp;title=Trojan%20Uses%20Commercial%20Firewall%20to%20Block%20AV%20Updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2042.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates&amp;title=Trojan%20Uses%20Commercial%20Firewall%20to%20Block%20AV%20Updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2052.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates&amp;Title=Trojan%20Uses%20Commercial%20Firewall%20to%20Block%20AV%20Updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2062.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Trojan%20Uses%20Commercial%20Firewall%20to%20Block%20AV%20Updates+%40+http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2072.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2082.png\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates&amp;t=Trojan%20Uses%20Commercial%20Firewall%20to%20Block%20AV%20Updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2092.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2009%2F10%2F16%2Ftrojan-uses-commercial-firewall-to-block-av-updates&amp;h=Trojan%20Uses%20Commercial%20Firewall%20to%20Block%20AV%20Updates\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2102.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2112.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2009\/10\/20091015_netfilter_properties.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-1454\" title=\"20091015_netfilter_properties\" alt=\"20091015_netfilter_properties\" src=\"http:\/\/webrootblog.files.wordpress.com\/2009\/10\/20091015_netfilter_properties.jpg\" width=\"185\" height=\"77\" \/><\/a>Purveyors of rogue security products continue to bulk up their arsenal of stupid tricks, all of which are designed to induce either fear or frustration in victims. Increasingly, certain distributions of rogue antivirus include a payload that blocks the infected computer from receiving antivirus updates. That part isn&#8217;t new; Many Trojan installers drop a Hosts file onto the infected machine which effectively prevents the computer from reaching any Web site listed in the file. But malicious Hosts files are easy to identify and remove, because they&#8217;re always in the same location (<em>C:Windowssystem32driversetc<\/em>), and the minute you delete a malicious Hosts file, the computer can connect to the previously-blocked Website.<\/p>\n<p>This new dirty trick employs components of a commercial software firewall development kit, called <strong>WinpkFilter<\/strong>, the Windows Packet Filter Kit, from <a href=\"http:\/\/www.ntkernel.com\/\" target=\"_blank\">NT Kernel Resources<\/a>. WinpkFilter isn&#8217;t inherently evil or even necessarily undesirable. It&#8217;s a set of tools that other developers can license to create small network filtering applications. But in this case, the malware author uses these tools to block access to the Web sites used by at least half a dozen antivirus vendors. We&#8217;re calling this malware <strong>Trojan-Netfilter<\/strong>; Some of the affected vendors call it either <strong>Liften <\/strong>or <strong>Interrupdate<\/strong>.<\/p>\n<p><!--more-->The installer of this low-key firewall, typically under 175KB, drops and installs the WinpkFilter files &#8212; ndisrd_xp.sys, ndisrd.sys, and ndisapi.dll &#8212; in the <em>C:Windowssystem32drivers<\/em> folder (for the .sys files) and <em>C:Windowssystem32<\/em> (the DLL). All three files are clearly identified as version 3.0.5.1 of the NT Kernel Resources software. It also drops <em>snetcfg.exe<\/em>, a Microsoft-authored command-line network configuration tool that&#8217;s distributed in the Windows Server 2003 resource kit, and uses it to install the WinpkFilter components.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2009\/10\/20091015_netfilter_files.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-1451\" title=\"20091015_netfilter_files\" alt=\"20091015_netfilter_files\" src=\"http:\/\/webrootblog.files.wordpress.com\/2009\/10\/20091015_netfilter_files.jpg\" width=\"394\" height=\"143\" \/><\/a><\/p>\n<p>According to NT Kernel Resources&#8217; Web site, the WinpkFilter software license ranges in price from $95 for an individual user, to nearly $3500 for a full development kit that includes source code.<\/p>\n<p>The malicious component that runs the show is called, simply, <strong>Netfilter.exe<\/strong>. The installer drops it into the <em>system32<\/em> folder and then creates a run key which causes it to start up with every reboot. The malicious package doesn&#8217;t work, however, until after a reboot, when the packet filtering drivers are loaded with Windows. After the reboot, anytime the Netfilter.exe application is running, it will block any attempt to connect to the affected update servers over the Internet.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2009\/10\/20091015_netfilter_ini.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-1453\" title=\"20091015_netfilter_ini_crop\" alt=\"20091015_netfilter_ini_crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2009\/10\/20091015_netfilter_ini_crop.jpg\" width=\"373\" height=\"72\" \/><\/a><\/p>\n<p>WinpkFilter is an interesting package for the malware creators to use. It&#8217;s not widely known, but offers developers a lot of functionality. In this case, the driver looks for packets which contain specific domain names or the Web server folder paths used by some AV vendors, and if it sees those things in the network traffic, blocks the connection. The infected user only sees that their computer never was able to download the updates, though every other website is able to function properly.<\/p>\n<p>We started seeing samples of Netfilter in the wild in early summer. It&#8217;s still getting pulled down by some <strong>Antivirus 2010<\/strong> installers, but not as frequently as in the period from June through August.<br \/>\nUsers of any of Webroot&#8217;s consumer or enterprise products can simply sweep for this spy and remove it, if it&#8217;s found. If you use another company&#8217;s antivirus product, and you see a file called Netfilter.exe running in your Task Manager, and you can&#8217;t download antivirus updates, try killing the Netfilter.exe process. If that instantly restores your ability to download updates, you can just browse to the location of that file and delete it.<\/p>\n<p><a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Purveyors of rogue security products continue to bulk up their arsenal of stupid tricks, all of which are designed to induce either fear or frustration in victims. Increasingly, certain distributions of rogue antivirus include a payload that blocks the infected computer from receiving antivirus updates. That part isn&#8217;t new; Many Trojan installers drop a Hosts [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4811,6505,3453,6511,3619,3483,6507,4197,6513,6519,4065,6509,6521,6503,6501,6517,3471,4313,4621,6515],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/1445"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=1445"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/1445\/revisions"}],"predecessor-version":[{"id":23916,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/1445\/revisions\/23916"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=1445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=1445"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=1445"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=1445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}