{"id":818,"date":"2014-09-24T23:49:44","date_gmt":"2014-09-25T03:49:44","guid":{"rendered":"http:\/\/www.ccrepairservices.com\/blog\/?p=818"},"modified":"2014-09-25T00:09:37","modified_gmt":"2014-09-25T04:09:37","slug":"keylogger-optimized-with-autoit-infected-thousands-of-computers","status":"publish","type":"post","link":"https:\/\/www.ccrepairservices.com\/blog\/computer-news\/keylogger-optimized-with-autoit-infected-thousands-of-computers\/","title":{"rendered":"Keylogger Optimized with AutoIT Infected Thousands of Computers"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/4.bp.blogspot.com\/-1FvCqf_a768\/VCE13ljnCDI\/AAAAAAAAgb4\/xu5PqkJltyc\/s728\/Limitless-keaylogger-tool-malware.jpg\" alt=\"\" width=\"728\" height=\"521\" \/><\/p>\n<div style=\"text-align: justify;\">A new surge of malware has been discovered which goes on to infect hundreds of thousands of computers worldwide and allegedly steals users\u2019 social and banking site credentials.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">Few days back, a list of 5 million combinations of Gmail addresses and passwords were leaked online. The search engine giant, Google said that Gmail credentials didn\u2019t come from the security breaches of its system, rather the credentials had been stolen by phishing campaigns and unauthorized access to user accounts.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">Just now, we come across another similar incident where cyber criminals are using a malware which has already compromised thousands of Windows users worldwide in an effort to steal their Social Media account, Online account and Banking account Credentials.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">A Greek Security Researcher recently discovered a malware sample via a spam campaign (caught in a corporate honeypot), targeting large number of computers users rapidly. He investigated and posted a detailed technical analyses of the malware on his blog.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">After reverse engineer the malware sample file, he found that the cybercriminals are using a combination of software <b>AutoIT<\/b> (Automate day-to-day tasks on computers) and a &#8220;commercial&#8221; Keylogger named &#8220;<b>Limitless Keylogger<\/b>&#8221; to make it FUD i.e. Fully Undetectable from static analysis.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">Keylogger is a critical type of software program for cyber criminals, which records every input typed into the keyboard and easily detects passwords for users\u2019 Email accounts, Social Media accounts and Online Bank accounts.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">This malicious application captures every keystrokes users press and send them to a specified email address linked to the cyber criminal. More interestingly, the malware uses AutoIT in order to evade detection by Antivirus programs.\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"separator\" style=\"clear: both; text-align: center;\"><img decoding=\"async\" title=\"Limitless Keylogger Optimized with AutoIT Infected thousands of Computers\" src=\"https:\/\/1.bp.blogspot.com\/-edfcwmDI9Lc\/VCE1gsx4qYI\/AAAAAAAAgbw\/nLmeGKrxK2E\/s728\/Limitless-keaylogger-tool-malware.jpg\" alt=\"Limitless Keylogger Optimized with AutoIT Infected thousands of Computers\" border=\"0\" \/>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: left;\">The malware distributed in the spam campaign comes as a WinRAR SFX executable file with a custom icon which drops 4 malicious files onto the victim\u2019s computers with hidden and system attributes.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">The Malware archive includes:\n<\/div>\n<p>&nbsp;<\/p>\n<ul>\n<li><b>AutoIT script<\/b> \u2018update.exe\u2019 of 331MB<\/li>\n<li><b>Python script<\/b> to \u201cdeobfuscate\u201d AutoIT script<\/li>\n<li><b>oziryzkvvcpm.AWX<\/b> &#8211; Settings for AutoIT script<\/li>\n<li><b>sgym.VQA<\/b> \u2013 Another Encrypted malware\/Payload Binary<\/li>\n<\/ul>\n<div style=\"text-align: justify;\">Initially the obfuscated AutoIT Script is of size 331MB, because it contains lots of garbage content, but after deobfuscate process it becomes only 55kbyte in size with clean malicious code.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">Researcher found lot of functions and various functionalities in the malware code those allow the malicious software to protect itself from detection.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">On Further reserve engineering, he found that the malware sends the collected keystroke data to the cybercriminal via SMTP email server. So he sniffed the whole conversation of malware SMTP traffic and discovered that the keylogger was sending all keystrokes of the user, screenshots, recovery data (saved passwords from several applications\/browsers) to an email ID &#8211; \u201c<b><i>ontherun4sales@yandex.ru<\/i><\/b>\u201d.\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">He also extracted the hardcoded SMTP email ID username and passwords of the respective Yandex mail address from the malware source code.\n<\/div>\n<div style=\"text-align: justify;\">\n<div class=\"separator\" style=\"clear: both; text-align: center;\"><img decoding=\"async\" title=\"Limitless Keylogger Optimized with AutoIT Infected thousands of Computers\" src=\"https:\/\/2.bp.blogspot.com\/-9VNwepdDqlY\/VCE1DqI2NQI\/AAAAAAAAgbo\/DSCrlyscG20\/s728\/Limitless-keaylogger-tool.png\" alt=\"Limitless Keylogger Optimized with AutoIT Infected thousands of Computers\" border=\"0\" \/>\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<\/div>\n<div style=\"text-align: justify;\">Researcher told SecNews, \u201c<i>The detection was accomplished in the past few days and found that the malware was being Greek is targeting users (minimum numerical cases).<\/i>\u201d\n<\/div>\n<div style=\"text-align: justify;\">\n<\/div>\n<div style=\"text-align: justify;\">\u201c<i>Possibly some Indonesian hackers might have used the malicious software available on the Russian hacking forum sites<\/i>\u201d they said. &#8220;<i>and\u00a0the targets are well known companies from retail industry,oil,airlines etc<\/i>&#8221;\n<\/div>\n<div style=\"text-align: justify;\">\n<\/div>\n<div style=\"text-align: justify;\">At last, the researcher also disclosed some online FTP servers using Google hacks, where the data has been uploaded by the different variants of the Limitless Logger by various hacking groups.\n<\/div>\n<div style=\"text-align: justify;\">\n<div style=\"text-align: justify;\">\n<h2 style=\"text-align: center;\"><span style=\"color: #00ff00;\">Please Visit our <a href=\"https:\/\/www.ccrepairservices.com\">Computer News Website and Blog<\/a><\/span><\/h2>\n<h1 style=\"text-align: center;\"><span style=\"color: #ff6600;\"> for latest computer repair and online news.<\/span><\/h1>\n<h2 style=\"text-align: center;\"><span style=\"color: #993300;\">Local and Online Virus removal and computer repairs anytime, anywhere<\/span><\/h2>\n<p style=\"text-align: center;\">Fort Lauderdale, Miami, Boca Raton, Boynton Beach and all South Florida<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new surge of malware has been discovered which goes on to infect hundreds of thousands of computers worldwide and allegedly steals users\u2019 social and banking site credentials. &nbsp; Few days back, a list of 5 million combinations of Gmail addresses and passwords were leaked online. The search engine giant, Google said that Gmail credentials didn\u2019t come from the security breaches of its system, rather the credentials had been stolen by phishing campaigns and unauthorized access to user accounts. &nbsp; Just now, we come across another similar incident where cyber criminals are using a malware which has already compromised thousands of Windows users worldwide in an effort to steal their Social Media account, Online account and Banking account Credentials. &nbsp; A Greek Security Researcher recently discovered a malware sample via a spam campaign (caught in a corporate honeypot), targeting large number of computers users rapidly. He investigated and posted a detailed technical analyses of the malware on his blog. &nbsp; After reverse engineer the malware sample file, he found that the cybercriminals are using a combination of software AutoIT (Automate day-to-day tasks on computers) and a &#8220;commercial&#8221; Keylogger named &#8220;Limitless Keylogger&#8221; to make it FUD i.e. Fully Undetectable from static [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[337,1150,103,19,1153,1149,120,139,32,1148,842,628,1154,1151,10,142,451,1152],"class_list":["post-818","post","type-post","status-publish","format-standard","hentry","category-computer-news","category-virus-and-malware-threats","tag-boca-raton","tag-computer-malware","tag-computer-news-2","tag-computer-repair","tag-computer-security-news","tag-computer-spyware","tag-computer-virus","tag-computer-virus-removal","tag-fort-lauderdale","tag-it","tag-keylogger","tag-local-news","tag-miamii","tag-new-spyware","tag-new-virus","tag-new-viruses","tag-online-news","tag-security-threat"],"_links":{"self":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/comments?post=818"}],"version-history":[{"count":7,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/818\/revisions"}],"predecessor-version":[{"id":829,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/818\/revisions\/829"}],"wp:attachment":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/media?parent=818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/categories?post=818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/tags?post=818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}