Experts discover variant of BIFROSE backdoor in targeted attack

Share this article:

A variant of the BIFROSE backdoor which is more evasive than its predecessor has been discovered by experts.

After investigating a targeted attack on a device manufacturer, researchers at TrendMicro uncovered the variant, which uses TOR to hide its traffic and communicate with its command-and-control servers, making it more elusive than its original version, according to a blog post by Christopher Daniel So, threat response engineer at TrendMicro.

The malware shares a similar capability to other backdoors in that it can log keystrokes, however, it can also send “keystrokes and mouse events” to windows, which allows an attacker to perform various functions on the victim's machine without having to compromise accounts.

So suggests that administrators can check for the existence of this backdoor by checking for a “klog.dat” file in their system – which is commonly associated with keylogging routines.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.