Experts discover variant of BIFROSE backdoor in targeted attack

Share this article:

A variant of the BIFROSE backdoor which is more evasive than its predecessor has been discovered by experts.

After investigating a targeted attack on a device manufacturer, researchers at TrendMicro uncovered the variant, which uses TOR to hide its traffic and communicate with its command-and-control servers, making it more elusive than its original version, according to a blog post by Christopher Daniel So, threat response engineer at TrendMicro.

The malware shares a similar capability to other backdoors in that it can log keystrokes, however, it can also send “keystrokes and mouse events” to windows, which allows an attacker to perform various functions on the victim's machine without having to compromise accounts.

So suggests that administrators can check for the existence of this backdoor by checking for a “klog.dat” file in their system – which is commonly associated with keylogging routines.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS