Koobface spreading through thousands of IP addresses

Share this article:
New Symantec research unveiled Tuesday shows that the criminals behind the Koobface worm are not slowing down.

According to a three-week study led by Ph.D. student Marco Cova, winner of Symantec Research Labs Graduate Fellowship, Koobface generated 17,170 unique IP addresses, which host social engineering ploys to infect victims with the data-stealing/DNS-changing malware.

"While the central [server] has been actively targeted by takedown requests, the Koobface gang has so far been quick to replace suspended domain names and blacklisted IPs with new ones," Cova said on the Symantec Security Response blog post.

Koobface is best known for attempting to compromise the PCs of users of social networking sites, such as MySpace, Facebook and Twitter. According to Kaspersky Lab, the number of Koobface variants jumped from 109 at the start of the year to nearly 1,000 at the end of June.

Symantec researchers also detected 11,337 malicious blogs, which redirect users to landing pages containing the worm. Victims visit the blogs -- automatically created on Google's Blogspot platform -- through search engine optimization (SEO) tactics.

A Google spokesperson could not immediately be reached for comment.

"More than a year has passed since Koobface was first detected," Cova said. "Yet this worm and the people behind it are still very active in keeping their infrastructure up-to-date, finding new means of propagating the infection and taking advantage of their victims."
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

CryptoWall surpasses CryptoLocker in infection rates

CryptoWall surpasses CryptoLocker in infection rates

A threat analysis from Dell SecureWorks CTU says that CryptoWall has picked up where its famous sibling left off.

Professor says Google search, not hacking, yielded medical info

Professor says Google search, not hacking, yielded medical ...

A professor of ethical hacking at City College San Francisco came forward to clarify that he did not demonstrate hacking a medical center's server in a class.

Syrian Malware Team makes use of enhanced BlackWorm RAT

Syrian Malware Team makes use of enhanced BlackWorm ...

FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.