Page 65 - index
P. 65







pic4a information:

Jabber:
[email protected]
[email protected]

Conclusion

This particular threat is very dangerous as the attacker will have total control over the affected
machine. We see that it can be used during a regular infection campaign or by some APT actors for
specific attacks against particular targets.

RMS/TVSPY continues to be developed, with a new version being posted by the developer/reseller
on a regular basis.

In fact, the legitimate RMS version developed by TektonIT and the version posted in criminal forums
appear to be identical.

TVSPY seems to be merely a modification of RMS to utilize TeamViewer infrastructure and a
command and control interface manageable through the web.

Damballa detects TVSPY as BlueSpiderCrashers.


Loucif Kharouni
Senior Threat Researcher

Willis McDonald
Senior Threat Researcher

Indicators of compromise:

- Under C:\kernel (folder kernel has hidden attribute):


















65 Cyber Warnings E-Magazine – September 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   60   61   62   63   64   65   66   67   68   69   70