About Us | Contact Us
View Cart

Malware Uses Windows Service To Reinstall Itself

By Vigilize | Friday, June 10, 2016 - Leave a Comment

An article review.

Even after removal, a hijhacked service can reinfect machines targeted with a new technique


News of a new malware technique comes from our friend Wes Pollard at Home Bank, who sent us an article about this interesting new threat.

Researchers at SecureWorks discovered the malware while responding to a customer incident last month, after complaints that nefarious network activity continued even after machines had been successfully cleaned by a security application. When the researchers looked into the issue they discovered that two unauthorized tasks had been entered into the Windows Background Intelligent Transfer Service, or BITS.

BITS is normally used by applications and the OS to install updates and as a system task it is trusted by the Windows firewall and allowed unimpeded network access, making it an excellent target for hackers. Even so, attacks utilizing BITS have been relatively rare since the first incidents were noted in 2007.

If you continue to see network activity related to malware even after cleaning it from your machines, researchers suggest listing all scheduled BITS tasks by entering the command bitsadmin /list /allusers /verbose from an administrator command prompt.

Original article by Lucian Constantin of IDG, writing for Computerworld.



Latest News