I thought some emails I got with a subject line: “RE: RE: Que video uau!………… muito bom!!!” and a link to a video looked suspicious. Especially since I didn’t know the sender.

Example of the EDUnet Trojan:

[EDUnet Trojan Image coming shortly]

BitDefender antivirus analysts have uncovered a spam-sending scheme of Byzantine complexity. The discovery came with the identification of spam e-mails which claim to contain links to videos. When users try to click and see the video, they are instead prompted to download a “media player.”

The media player is in fact Backdoor.Edunet.A, a piece of malware which uses victims’ computers as a channel for sending commands to a series of mail servers. The mail servers, which are used to spread spam, are mostly in the .edu and .mil domains.

The list of servers is retrieved by the trojan from a series of web servers which are either compromised themselves or part of the attackers’ own network. The list of web servers is continuously changing, but that of the targets has, so far, remained constant.

The trojan sends the commands in the hopes of finding an open relay – a mis-configured mail server that allows anyone to send e-mails – basically making it appear that any mail originating from the trojan is actually one that has been sent from the open relay.

BitDefender researchers have determined that, at least currently, none of the servers in the current target list are actually vulnerable.

“It’s not every day that you stumble on the workings of an honest-to-God hacking ring, let alone one that has a predilection for using military and university-run mail servers as spam relays,” declared Sorin Dudea, BitDefender’s head of AV Research. “It would be interesting to identify what, if anything, the institutions that own the targeted servers have in common.”

Secure your computer against trojans

Until next time 😉

Peter – Your BitDefender Guide