Revealing the ecological chain of AV Terminator virus

Source: Internet
Author: User
Tags safe mode

Forum on the "AV Terminator" virus consultation, still continue to grow, originally I thought this virus, the user will soon find the anti-virus software work abnormal, and then will find a way to deal with the virus, the concealment of the virus will not be too strong. But this is not the case, most users of anti-virus software does not work properly does not feel abnormal. Because, at this time other functions of the system are basically unaffected, the virus will not affect system performance or affect network speed. So that the system has been poisoned can also apply for Remote Assistance to complete the manual antivirus operation.

I'm thinking about another question--"AV Terminator" virus, like "Panda incense," is the masterpiece of the Group of thieves??

First look at the "AV Terminator" virus program itself designed to spread the function-the program itself can only be transmitted through the U disk or mobile hard drive. How can a virus with such a simple way of transmission cause such a mass spread? This is clearly not possible by the natural derivation of the virus program alone. Well, the virus is most likely a result of human manipulation.

So the "AV Terminator" virus, the first is through what way to invade it? Is there more to hide behind this virus?

Before the AV terminator, there are two kinds of viruses worth our attention, one is "Risk.exploit.ani" virus, is the use of ANI loopholes widely hanging horse. Another category, is the use of ARP spoofing, hijacking the entire LAN session, the hijacked LAN computer users visit any site will be at the same time from the 16.us site (there are more download stations) Download Trojan Horse.

Compared with the panda burning incense virus case, "AV Terminator" performance more covert, the virus against anti-virus software is almost played a trick to the extreme. The entire "AV Terminator" virus spreads the chain more complex than pandas burn incense. "AV Terminator" virus already has the enterprise, the corporate operation characteristic. The AV terminator virus spread link consists of the following three phases.

Phase one: Spreading the AV terminator virus

The most rapid and effective means of communication is to attack the enterprise public service (usually IDC computer room hosted by the server), after the successful attack, directly on the server implanted Trojan, and then use ANI vulnerabilities quickly spread. Not only that, the attacker would also embed an ARP attack on the compromised server, successfully extending the results of the horse-hanging to the entire room. Similar techniques, you can hack into the intranet, the launch of ARP attacks, and quickly let the phenomenon of horse-hanging in the entire corporate network spread.

Another approach is more direct, the production of the Complete "AV Terminator" virus through the U disk, in Internet cafes and other public internet sites for human transmission. The method is very simple, to the target machine plug a U disk on it.

Phase II: "AV Terminator" virus active period

After the "AV Terminator" virus successfully invaded, it can almost hijack all kinds of anti-virus software, system configuration management software commonly used by Chinese users, and turn off Windows Firewall and Windows Automatic Update. To prevent users from cleaning up the virus in Safe mode, the virus simply modifies the system configuration and does not allow the system to boot into safe mode. The aim is clear--that is, to quickly deprive a poisoned system of its ability to take security precautions.

The third stage: Trojan Horse active period

After the previous phase of preparation, the "AV Terminator" successfully let the poisoned computer system completely lose the ability to safeguard. Then, the virus built in the function of the downloader, the number of 10 different features of the Trojan backdoor program through the "AV Terminator" virus downloaded to the computer has been poisoned, these Trojans will take away the Trojan horse control of anything interesting. The ultimate damage on a computer depends on the preferences of the Trojan controller.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.