Jump to content

New TeamSpy Malware Campaign Turns TeamViewer into Spy Tool


WALLONN7

Recommended Posts

The malware can affect anyone downloading the wrong mail attachment and unzipping the file onto their computers

http://i1-news.softpedia-static.com/images/news2/new-teamspy-malware-campaign-turns-teamviewer-into-spy-tool-513115-2.jpg

TeamSpy is back and it's turning TeamViewer into the spying tool that no one wants. 

 

According to security firm Heimdal, a new spam campaign emerged over the weekend, carrying the TeamSpy malware which can give hackers full access to a compromised computer.

This isn't a new type of malware whatsoever. In fact, back in 2013, it was wrecking havoc in countless computers. Back then, attackers were gathering information from victims, be them ordinary users or high profile individuals working in industries or research, or even diplomats.

This time around, however, it seems that TeamViewer has not been compromised as it happened in the past, so reusing their passwords (please don't do that) should be safe.

Instead, it seems that attackers are using social engineering techniques and taking advantage of people's careless use of computers and the Internet to trick them into installing the malware.

How does it work?

First, an email from a spoofed address will get the victim to download a zip file, which, once opened, triggers the .exe file inside to be activated. The TeamSpy code is then dropped onto the victim's computer, as a malicious DLL. The emails noticed by the security firm had "eFax message from “1408581 **" as a subject line.

As before, the cybercriminals install a legitimate version of TeamViewer on their victims' computers and then alter the behavior with DLL hijacking to make sure it stays hidden.

"TeamSpy malware includes various components in the otherwise legitimate TeamViewer application. A keylogger and a TeamViewer VPN are two of these components," Heimdal security experts write.

The logs are copied to a file, adding all available user names and passwords. The file is continuously sent to a C & C server.

Be mindful of the fact that the attack can circumvent two-factor authentication and can give cybercriminals access to encrypted content which is unencrypted by the users on the infected computers.

Currently, there's a very low detection ratio of the malware of 15/58, which means only 15 of the tested antivirus software were able to detect it, including Kaspersky, ESET, Cyren, McAfee, Microsoft, Sophos, and Symantec, to name a few.

Since this is just the beginning of the attack, you may want to pay special attention to the emails you receive and abstain from downloading any files that don't appear to be trustworthy.

 

Source

Link to comment
Share on other sites


  • Views 778
  • Created
  • Last Reply

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...