Sales
0161 215 3700
0800 458 4545
Support
0800 230 0032
0161 215 3711

Virus writers smuggle malicious files onto PCs

Virus writers smuggle malicious files onto PCs

Virus writers may be able to smuggle malicious files onto a computer using Microsoft's security patch updates, experts say. At least one program is in circulation that can hijack a key component of Windows Update to introduce malicious software that could be used to hijack a computer. The method bypasses users' firewall, allowing files to download undetected. Microsoft said it was aware of reports of the attack. Security expert Frank Boldewin said on his website reconstruction.org that he had recently noticed an e-mailed trojan - a type of program or message that looks benign but conceals a malicious payload - which was exploiting a Windows program known as the Background Intelligent Transfer Service (BITS). BITS is used by Microsoft to download security patches and updates to Windows machines. Because it is part of the operating system, it is able to bypass local firewalls while it downloads. Mr Boldewin found the trojan was piggybacking on BITS to download malicious files. He published "proof of concept" code to illustrate how it went about it. Not suspicious After analysing this code Elia Florio, a researcher at security firm Symantec, wrote in her blog: "Using BITS to download malicious files is a clever trick because it bypasses local firewalls, as the download is performed by Windows itself, and does not require suspicious actions for process injection." However, Microsoft said that for BITS to be exploited, machines first had to become infected with the trojan that Mr Boldewin discovered. A spokesperson for the software giant said: "Microsoft is aware of public reports that Background Intelligent Transfer Service (BITS) is being used by TrojanDownloader:Win32/Jowspry to bypass policy-based firewalls in order to install additional malware. "The bypass relies on [Jowspry] already being present on the system; it is not an attack vector for initial infection. "The bypass most commonly occurs after a successful social engineering attempt lures the user into inadvertently running [Jowspry], which then utilizes BITS to download additional malware." Security consultant Robert Schifreen told the BBC News website: "In some ways it is immaterial that it is using BITS. "The simple message is not to get infected in the first place. Don't click on any links or attachments unless you are certain they are safe and use anti-virus software." Microsoft recommended that anybody who thought they may have been infected with the Jowspry trojan should visit Windows Live OneCare safety scanner.

print this article

Return to internet news headlines
View Internet News Archive

Share with: