Last Updated: 2008-01-08 21:56:56 UTC
by Swa Frantzen (Version: 2)
Matt Richard from Verisign's iDefense sent us some information regarding the Master Boot Record (MBR) rookit that's been found in the wild in the past weeks.
The first interesting part is the timeline:
- Aug 1, 2005 - eEye publishes PoC code
- Aug. 3, 2007 - Vbootkit presentation at Black Hat USA
- Oct. 30, 2007 - Original version of MBR rootkit written and tested by attackers
- Dec. 12, 2007 – First known attacks installing MBR code
about 1,800 users infected in four days.
- Dec. 19, 2007 - Second wave of attacks installing MBR code
about 3,000 users infected in four days
- Dec. 22, 2007 – Malware Research Form members discover rootkit in the wild
- Jan. 2, 2008 - GMER research and analysis of MBR Rootkit code
- Jan. 7, 2008 – First anti-virus vendors detect MBR rootkit components
The next big thing is that those distributing this rootkit, also distribute the Torpig banking Trojan.
The rootkit is currently being installed through a set of relatively old, and easy to patch Microsoft vulnerabilities:
- Microsoft JVM ByteVerify (MS03-011)
- Microsoft MDAC (MS06-014) (two versions)
- Microsoft Internet Explorer Vector Markup Language (MS06-055)
- Microsoft XML CoreServices (MS06-071)
But that can change at any moment to something more recent.
The different files involved had rather spurious detection in the anti-virus world.
Swa Frantzen -- Gorilla Security