Malware Uses Windows Service To Reinstall Itself
An article review.
Even after removal, a hijhacked service can reinfect machines targeted with a new technique
News of a new malware technique comes from our friend Wes Pollard at Home Bank, who sent us an article about this interesting new threat.
Researchers at SecureWorks discovered the malware while responding to a customer incident last month, after complaints that nefarious network activity continued even after machines had been successfully cleaned by a security application. When the researchers looked into the issue they discovered that two unauthorized tasks had been entered into the Windows Background Intelligent Transfer Service, or BITS.
BITS is normally used by applications and the OS to install updates and as a system task it is trusted by the Windows firewall and allowed unimpeded network access, making it an excellent target for hackers. Even so, attacks utilizing BITS have been relatively rare since the first incidents were noted in 2007.
If you continue to see network activity related to malware even after cleaning it from your machines, researchers suggest listing all scheduled BITS tasks by entering the command bitsadmin /list /allusers /verbose from an administrator command prompt.
Original article by Lucian Constantin of IDG, writing for Computerworld.
In this short video, Mike, our “Envoy from the SIEM”, walks us through how data flows
Dan’s reflection on the past 20 years. A Dan’s New Leaf post about predictions. If yo
Welcome Webinar Attendees! You can download a zip folder with all three of the delive
Another awareness poster for YOUR customers (and users). Now that we have our own em