{"id":10576,"date":"2017-11-22T11:10:42","date_gmt":"2017-11-22T19:10:42","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/22\/news-4348\/"},"modified":"2017-11-22T11:10:42","modified_gmt":"2017-11-22T19:10:42","slug":"news-4348","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/22\/news-4348\/","title":{"rendered":"Terdot Trojan likes social media"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 22 Nov 2017 18:47:17 +0000<\/strong><\/p>\n<p>We usually advise people that have fallen victim to banker Trojans to change all their passwords, especially the ones that are related to their financial sites and apps. Besides the dangers of re-used passwords, there are other reasons why this is important. This advice is especially applicable to a Trojan making the rounds called Terdot.<\/p>\n<p>Our friends at Bitdefender wrote a\u00a0<a href=\"https:\/\/labs.bitdefender.com\/2017\/11\/terdot-zeus-based-malware-strikes-back-with-a-blast-from-the-past\/\" target=\"_blank\" rel=\"noopener\">white paper<\/a>\u00a0about the Terdot Trojan that shows how this offspring of Zeus can not only monitor and modify your Facebook, Twitter, YouTube, and Google Plus traffic, but also spy on webmail platforms like\u00a0Microsoft\u2019s live.com login page,\u00a0Yahoo Mail, and Gmail.<\/p>\n<p><a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener\">Hasherezade<\/a>\u00a0already saw this coming at the start of this year\u00a0when she warned us that Terdot spies and also modifies the displayed content by \u201cWebInjects\u201d and \u201cWebFakes.\u201d<\/p>\n<p>The Terdot Trojan is both spread by email, using infected attachments, as well as by the Sundown <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/exploit\/\" target=\"_blank\" rel=\"noopener\">exploit kit<\/a>. It uses a complex method to download and activate the malware on the targeted system, most likely to throw security researchers off the scent. Once established, it uses its own <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/explained-security-certificates\/\" target=\"_blank\" rel=\"noopener\">security certificate<\/a>\u00a0to bypass TLS restrictions and set up a\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/man-in-the-middle-mitm\/\" target=\"_blank\" rel=\"noopener\">man-in-the-middle (MitM)<\/a>\u00a0proxy.<\/p>\n<p>This Terdot variant only targets Windows systems that don&#8217;t run a Russian operating system. Its main targets are in the US, Canada, the UK, Germany, and Australia. The added functionality for social media might be used in different ways.\u00a0Bogdan Botezatu, Senior e-Threat Analyst at Bitdefender, told <a href=\"http:\/\/www.zdnet.com\/article\/this-banking-malware-wants-to-scoop-up-your-email-and-social-media-accounts-too\/\" target=\"_blank\" rel=\"noopener\">ZDNet:<\/a><\/p>\n<blockquote>\n<p>&#8220;Social media accounts can be also used as a propagation mechanism once the malware is instructed to post links to downloadable copies of the malware. Additionally, the malware can also steal account login information and cookies, so its operators can hijack the social network account and re-sell access to it, for instance,&#8221;<\/p>\n<\/blockquote>\n<p>Malwarebytes detects the installers as Trojan.Terdot:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20607\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/protection1.png\" alt=\"detection\" width=\"525\" height=\"270\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/protection1.png 525w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/protection1-300x154.png 300w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/p>\n<p>And blocks the download URLs:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20608\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/protection2.png\" alt=\"blocked URL\" width=\"471\" height=\"347\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/protection2.png 471w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/protection2-300x221.png 300w\" sizes=\"auto, (max-width: 471px) 100vw, 471px\" \/><\/p>\n<p>Stay safe out there and get protected.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/malware-threat-analysis\/2017\/11\/terdot-trojan-likes-social-media\/\">Terdot Trojan likes social media<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/malware-threat-analysis\/2017\/11\/terdot-trojan-likes-social-media\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 22 Nov 2017 18:47:17 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/malware-threat-analysis\/2017\/11\/terdot-trojan-likes-social-media\/' title='Terdot Trojan likes social media'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/shutterstock_248842327.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The Terdot Trojan is a banker, but it loves to steal your social networks credentials as well.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/banker\/\" rel=\"tag\">banker<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-media\/\" rel=\"tag\">social media<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/terdot\/\" rel=\"tag\">terdot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter\/\" rel=\"tag\">twitter<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/malware-threat-analysis\/2017\/11\/terdot-trojan-likes-social-media\/' title='Terdot Trojan likes social media'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/malware-threat-analysis\/2017\/11\/terdot-trojan-likes-social-media\/\">Terdot Trojan likes social media<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1763,3589,3764,10546,1932,11101,10494,10833,454],"class_list":["post-10576","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-banker","tag-facebook","tag-malware","tag-malwarebytes-news","tag-social-media","tag-terdot","tag-threat-analysis","tag-trojan","tag-twitter"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10576"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10576\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10576"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}