Experts discover variant of BIFROSE backdoor in targeted attack
A variant of the BIFROSE backdoor which is more evasive than its predecessor has been discovered by experts.
After investigating a targeted attack on a device manufacturer, researchers at TrendMicro uncovered the variant, which uses TOR to hide its traffic and communicate with its command-and-control servers, making it more elusive than its original version, according to a blog post by Christopher Daniel So, threat response engineer at TrendMicro.
The malware shares a similar capability to other backdoors in that it can log keystrokes, however, it can also send “keystrokes and mouse events” to windows, which allows an attacker to perform various functions on the victim's machine without having to compromise accounts.
So suggests that administrators can check for the existence of this backdoor by checking for a “klog.dat” file in their system – which is commonly associated with keylogging routines.