Respected,
Thanks a lot for this very useful information.
Regards,
AMAR JAIN.
MOBILE:+91 9929 87 9006.
EMAILS:[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL PROTECTED]




----- Original Message ----- 
From: "Mamta" <[EMAIL PROTECTED]>
To: <accessindia@accessindia.org.in>
Sent: Wednesday, January 23, 2008 11:36 PM
Subject: Re: [AI] Fw: A Trojan Horse that targets Blindness Products


> Thanks a lot for this vorning!
>
> How ever for those who want to read about this here is the content pasted
> below:
>
> 17 January 2008 16:29 GMT
>
> Blind computer users struck by a very unusual Trojan attack
>
> While I was
> investigating
> reports of the
> Troj/Mbroot-A
> Master Boot Record rootkit I decided to follow up on a suggestion seen on 
> a
> mailing list. It was suggested that an incident described on
> ZoneBBS
> forum may be related to the MBR trojan I was initially looking for.
>
> The thread contains a number of posts submitted by several very distressed
> forum members. According to their reports, they have been unable to use
> their
> Windows computers since Boxing Day. The news itself would not be very
> interesting if the forum members complaining about these incidents were 
> not
> blind.
> Their computers were rendered unusable because the software used to read 
> the
> screen text and convert it to speech suddenly stopped working. An
> interesting
> thing was that not all users were using the same screen reader software.
>
> I was quite keen to help, but the users had already managed to pinpoint 
> the
> culprit. It was a fake crack for
> JAWS 9.0
> screen reader software, one of the most popular screen readers. Allegedly,
> the crack did not just patch the JAWS executables to allow them to run
> without
> a legitimate licence, but it also installed a Trojan targeting JAWS and
> other popular screen readers.
>
> Thanks to
> Ryan Smith
> , a developer of accessible games who also created a tool to help the 
> users
> prevent the Trojan, I have managed to get the offending file. When I run 
> it
> through our automated analysis system I could immediately see that the 
> patch
> installs more than one would hope for. Three additional files were
> installed,
> two executables - mci32.exe in Windows and svchost.exe in the 
> Windows\Config
> folder. Furthermore, there was a DLL named securityService.dll in the 
> System
> folder. Suspicious registry activity triggered the detection in the
> HIPS
> portion of Sophos Anti-Virus 7.
>
> killjws2.jpg
>
> The dropped DLL was also registered with Winlogon process so that the
> malicious code was loaded early during the logon process.
>
> I started the disassembly with interest. It soon became clear that this 
> was
> a very unusual and well-executed attack targeting blind people. The
> attention
> to detail and the programming style implies that the attacker was skilled,
> possibly a professional programmer.
>
> As with some other advanced malware, the Trojan processes are protected by
> each other. The securityService.dll is protecting svchost.exe so it can 
> not
> be
> terminated using standard tools such as Task Manager and svchost shields
> mci32.exe from deletion. This is a protection chain similar to the one 
> seen
> in
> some earlier variants of Troj/Zlob. Furthermore, the securityService.dll
> registered a handler function which will get notified if the Registry key
> "HKLM\SOFTWARE\Microsoft\Windows
> NT\CurrentVersion\Winlogon\Notify\securityService" is changed and restore
> its previous values.
>
> In other words, the removal of this beast is quite difficult, even if the
> person cleaning up the system was not blind. The best thing would be to
> reboot
> the system from a clean bootable media and remove all offending files, but
> that may be out of the question since the accessibility features in most
> Linux
> bootable CD distributions are not very good. The next best thing is to
> install an anti-virus software that can remove the Trojan. Sophos 
> Anti-Virus
> 7 detects
> it as
> Troj/KillJWS-A
> and it can successfully remove the Trojan.
>
> Next thing I wanted to check was the payload. If the discussion on ZoneBBS
> was correct, the Trojan would prevent screen readers from working on 26
> December
> 2007. I started looking for the time comparison and it did not take too 
> long
> to find this code snippet:
>
> Disassembly Troj/KillJWS-A
>
> The payload trigger time is compared with the current system time 
> converted
> to the number of seconds expired since 1 January 1970. When converted to
> system
> time, the long value used for comparison is exactly 26 December 2007 at 
> 0:00
> and the payload will be launched if the current system time is later than
> the trigger time. The payload is relatively simple. The payload function
> enumerates all processes and compares the names of the running processes
> with
> a list of processes containing several well known text-to-speech programs
> such as Jaws, Windows Eyes, Microsoft Narrator, HAL Screen Reader and
> Kurzweil.
>
> Overall, this attack left me questioning the attacker's morality as it is
> really difficult to imagine what would be the motivation for an attack 
> like
> this
> one. The attack does not seem to be financially motivated, although one 
> may
> think that the intention was to "punish" people using illegal copies of 
> JAWS
> software. All this makes me think that long prison sentences for malware
> writers conducting attacks such as this one are not harsh as I used to
> believe.
>
> Vanja Svajcer, SophosLabs, UK
>
> ----- Original Message ----From: "Vetrivel Adhimoolam"
> <[EMAIL PROTECTED]>
> To: <accessindia@accessindia.org.in>
> Sent: Wednesday, January 23, 2008 11:23 PM
> Subject: [AI] Fw: A Trojan Horse that targets Blindness Products
>
>
> Be aware!
>
> ----- Original Message ----- 
> From: Stephen Baum
> To: [EMAIL PROTECTED] ; [EMAIL PROTECTED]
> Sent: Wednesday, January 23, 2008 9:34 AM
> Subject: A Trojan Horse that targets Blindness Products
>
>
> This was brought to our attention by a customer, and we thought you
> should know about it.
>
> There is apparently a trojan horse (that's a particularly nasty
> variety of malware) that disables a variety of products for people
> with disabilities, but particularly JAWS, WindowEyes, Microsoft
> Narrator, HAL, and Kurzweil. It was masquerading as a crack to
> disable the software protection features of JAWS 9.0. See
> http://www.sophos.com/security/blog/2008/01/998.html for additional
> information.
>
> Stephen
>
> *******************************************************
> To find out how to unsubscribe, please visit:
> http://www.kurzweiledu.com/support_listserv_signup.asp
> To unsubscribe send a message to [EMAIL PROTECTED] 
> with
> the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, 
> please
> visit the list home page at
>  http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>
>
> To unsubscribe send a message to [EMAIL PROTECTED] 
> with the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, 
> please visit the list home page at
>  http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in 


To unsubscribe send a message to [EMAIL PROTECTED] with the subject unsubscribe.

To change your subscription to digest mode or make any other changes, please 
visit the list home page at
  http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in

Reply via email to