We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Trojan Hearse spells doom for surfers

Beware geeks bearing rootkits

Security researchers at Sana Security are warning of a new type of malicious software designed to steal usernames and passwords from web surfers. The malware, dubbed "rootkit.hearse", uses rootkit-cloaking techniques, making it extremely difficult to detect.

To steal information, however, the software must first be downloaded on to a user's system. This can be done by tricking the user into downloading the malicious code, or by infecting a computer with some other form of malware. Once installed, it sends the sensitive information to a server in Russia, that appears to have been in operation since 16 March, Sana said.

The software has two components: a Trojan horse application that communicates with the Russian server, as well as rootkit software that cloaks the malicious software from system tools and antivirus programs. Sana has observed the software being downloaded in conjunction with the Win32.Alcra worm.

Rootkit.hearse uses the same kind of cloaking techniques made infamous by Sony's XCP rootkit software, making it hard to find, according to Sana chief technology officer Vlad Gorelik.

As of late Monday, rootkit.hearse was detected by only five of the 24 security products that Sana tested it against, though that number is expected to change as word gets out. "I'm sure that there are others who are beginning to pick it up at this point," Gorelik said.

The Trojan horse software spends most of its time lurking in the background, but it springs to life to communicate with the Russian server whenever a user hits a website that requires authentication. The software can read password information as it is typed or even when it is automatically stored and submitted by features such as Internet Explorer's AutoComplete.

As of Tuesday, the Russian server had stored about 35,000 unique usernames and logins that could be used on about 7,000 different websites, including banking, auction and social-networking sites, Gorelik said.

Sana informed the Russian ISP for the site in question on Monday, Gorelik said. Sana declined to name the ISP. As of yesterday morning, the Russian site was still operational, he said.


IDG UK Sites

Best Black Friday 2014 tech deals: Get bargains on smartphones, tablets, laptops and more

IDG UK Sites

What the Internet of Things will look like in 2015: homes will get smarter, people might get fitter

IDG UK Sites

Artist creates a geometric rave in a chapel for The House of St Barnabus

IDG UK Sites

Mac mini (Late 2014) 1.4 GHz review: Mac mini is sort of upgradable, but is it any good as it is?