{"id":2519,"date":"2010-04-08T09:38:50","date_gmt":"2010-04-08T16:38:50","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=2519"},"modified":"2018-01-30T13:16:01","modified_gmt":"2018-01-30T20:16:01","slug":"this-pc-will-self-destruct-in-ten-seconds","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/04\/08\/this-pc-will-self-destruct-in-ten-seconds\/","title":{"rendered":"This PC Will Self-Destruct in Ten Seconds"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2003.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/04\/08\/this-pc-will-self-destruct-in-ten-seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2013.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds&amp;title=This%20PC%20Will%20Self-Destruct%20in%20Ten%20Seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2023.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds&amp;title=This%20PC%20Will%20Self-Destruct%20in%20Ten%20Seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2033.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds&amp;title=This%20PC%20Will%20Self-Destruct%20in%20Ten%20Seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2043.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds&amp;title=This%20PC%20Will%20Self-Destruct%20in%20Ten%20Seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2053.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds&amp;Title=This%20PC%20Will%20Self-Destruct%20in%20Ten%20Seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2063.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=This%20PC%20Will%20Self-Destruct%20in%20Ten%20Seconds+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2073.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2083.png\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds&amp;t=This%20PC%20Will%20Self-Destruct%20in%20Ten%20Seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2093.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F04%2F08%2Fthis-pc-will-self-destruct-in-ten-seconds&amp;h=This%20PC%20Will%20Self-Destruct%20in%20Ten%20Seconds\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2103.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2113.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100408_selfdestruct_batchscript.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-2522\" title=\"20100408_selfdestruct_batchscript\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100408_selfdestruct_batchscript.jpg\" width=\"245\" height=\"79\" \/><\/a>Phishing Trojans that try to remain below the radar are still prevalent, but a number of files coming through Threat Research point to a disturbing trend: Several new variants of existing malware families are taking a <em>scorched earth<\/em> approach to infected computers, rendering the PC unbootable (just check out the batch file at left for just one egregious example) once the malware has retrieved whatever data it&#8217;s trying to steal, or deliberately crashing it, repeatedly, if you try to remove it.<\/p>\n<p>Since the middle of last year, we&#8217;ve seen a sprinkling of malware that also wipes out key files on the hard drive, sometimes preventing a reboot, after an infection. This isn&#8217;t <em>hostageware<\/em>, which overtly threatens to delete the contents of the hard drive if you don&#8217;t pay up, but something more sinister.<\/p>\n<p>In some cases, the crashes we saw were the result of poor coding by the malware author. But increasingly it appears that <a href=\"http:\/\/blog.s21sec.com\/2009\/04\/when-bot-master-goes-mad-kill-os.html\" target=\"_blank\">this behavior is deliberate<\/a>, and occurs without warning. And this unfortunate trend appears to be getting worse, leaving a raft of perplexed, angry victims unable to use their computers in the wake of an infection.<\/p>\n<p><!--more--><\/p>\n<p>The commands within malware capable of rendering infected machines inoperable was first documented in detail last year. But recent files added to at least two of our definitions, <strong>Trojan-Downloader-Tacticlol<\/strong> and <strong>Trojan-Backdoor-Zbot<\/strong>, indicate that someone has begun to use this functionality.<\/p>\n<h3>Zbot<\/h3>\n<p>Many, if not most of the Trojans we investigate turn an infected computer into a node on a botnet. A computer on a botnet becomes a usable, rentable, or sellable asset to the person who controls the botnet. Bots can send spam, spread malware to other computers, engage in distributed denial-of-service attacks, serve as covert file storage areas, and a host of other undesirable activities.<\/p>\n<p>The longer an infected PC remains infected and functional, the more the person or group controlling the botnet can do with it, and the more valuable it is. There is a financial disincentive for the botnet&#8217;s controller to terminate nodes on the network.<\/p>\n<p>But Zbot isn&#8217;t like most botnet bots. It stays in communication with a centralized server, but it doesn&#8217;t do most of the other behaviors I listed above. The bot is remarkably efficient at stealing any saved credentials or other usable login data, then sending it onwards, within seconds of the infection taking hold on a PC. But that&#8217;s pretty much it.<\/p>\n<p>After, say, two minutes post-infection, Zbot usually remains active, quietly logging any non-saved usernames and passwords a victim might enter into a Web form. But the fact is, most people instruct their applications and browsers to store usernames and passwords, so they don&#8217;t have to log into a Web site or application time and time again. It&#8217;s just easier that way. There&#8217;s a pretty severe case of diminishing returns from Zbots after the initial infection.<\/p>\n<p>Several of our Threat Research and Advanced Malware Removal team speculated as to motives: Once Zbot has stolen the information it needs, these new variants may deliberately disable the PC as a distraction, making it more difficult for the victim to become aware that credentials were stolen and used until it&#8217;s too late.<\/p>\n<p>In the case of these destructive Zbot Trojans, the system bluescreens soon after an infection. Because Zbot runs upon reboot, PCs infected with this variant go into a spasmodic reboot cycle. Booting from another device, like a boot CD, can permit a victim to remove the Trojan components (if you know where to look) and get back to work quickly. Less technically savvy victims are not so lucky.<\/p>\n<h3>Tacticlol<\/h3>\n<p>With the Tacticlol downloader, it&#8217;s not the spy itself but a downloaded payload that carries the seed of the PC&#8217;s\u00a0 destruction. Analysis of this particular spy took a long time because it won&#8217;t operate in a virtual environment, and I sent my test PC into death throes repeatedly.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100325_selfdestruct_facebookspam.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-2525\" title=\"20100325_selfdestruct_facebookspam\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100325_selfdestruct_facebookspam.jpg?w=300\" width=\"300\" height=\"171\" \/><\/a><\/p>\n<p>Tacticlol &#8212; which arrives in your email inbox disguised as either <strong>UPS shipping information<\/strong> or some sort of\u00a0 <strong>Facebook account update<\/strong> &#8212; typically downloads at least one Rogue Antivirus payload when a victim unzips the attachment and runs the file. UPS shipping-confirmation spam and its ilk have been <a href=\"http:\/\/blog.webroot.com\/2009\/09\/15\/shipping-confirmation-malware-on-the-rise\/\" target=\"_blank\">around the block<\/a> a <a href=\"http:\/\/www.snopes.com\/computer\/virus\/ups.asp\" target=\"_blank\">few times<\/a>. The most recent flood of these downloaders began to hit inboxes in the past month. I&#8217;m still getting new ones.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100325_selfdestruct_upsspam.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-2526\" title=\"20100325_selfdestruct_upsspam\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100325_selfdestruct_upsspam.jpg?w=300\" width=\"300\" height=\"163\" \/><\/a><\/p>\n<p>One of the spy&#8217;s payloads in this most recent distribution is a rogue called <strong>XP Defender<\/strong>. The rogue itself downloads additional payloads, some of which help it perform its curious brand of security theater.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100408_selfdestruct_xpdefenderpop.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-2528\" title=\"20100408_selfdestruct_xpdefenderpop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100408_selfdestruct_xpdefenderpop.jpg?w=300\" width=\"300\" height=\"217\" \/><\/a><\/p>\n<p>One of these payloads is a component which disables most common browsers, Outlook Express, and other Internet-enabled\u00a0 apps (a list of some of the apps and files it interferes with is below). It also contains within it a three-line batch file which, when run, deletes the NT Boot Loader file as well as the\u00a0 entire\u00a0 Windows directory and every system-critical file inside it. This not only renders the computer inoperable, but\u00a0 also requires a full Windows reinstallation (or, if you backed up an image of the drive with Acronis or Ghost, a reimage of the drive).<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100408_selfdestruct_hookedfiles.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2529\" title=\"20100408_selfdestruct_hookedfiles\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/04\/20100408_selfdestruct_hookedfiles.jpg\" width=\"188\" height=\"240\" \/><\/a><\/p>\n<p>The program only executes the batch file when someone tampers with the component, so as long as you permit the rogue to harass you with bogus warnings, it won&#8217;t kill your computer. But it&#8217;s just a game of Russian roulette. Antivirus scans (from legitimate products) sometimes trigger the batch to execute, but at other times nothing happens and you can remove the file without problems.<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing Trojans that try to remain below the radar are still prevalent, but a number of files coming through Threat Research point to a disturbing trend: Several new variants of existing malware families are taking a scorched earth approach to infected computers, rendering the PC unbootable (just check out the batch file at left for [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[7525,7519,5111,3453,4765,3619,3483,7483,3487,6121,4197,3477,7523,4247,4893,4061,7521,3471,3927,6973],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2519"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=2519"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2519\/revisions"}],"predecessor-version":[{"id":23909,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2519\/revisions\/23909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=2519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=2519"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=2519"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=2519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}