Thursday, April 27, 2017
Home / Malware / TOR Botnet Involved in Large Scale Click Fraud Campaign

TOR Botnet Involved in Large Scale Click Fraud Campaign

Microsoft’s Malware researcher Geoff McDonald verifies that malware dubbed the Sefnit is driving a monumental click fraud operation and is the same family of malware as the recently discovered Mevade botnet thought responsible for a spike in Tor network connections.

In June of 2013 the researchers revealed a click fraud component which they first classified as Mevade, the malware credited with being responsible for a 600% growth in the Tor network which was first believed to be a blowback from the NSA leaks.

“Last week we concluded, after further review, that Mevade and Sefnit are the same family and our detections for Mevade have now been moved to join the Sefnit family,” McDonald stated.

“The new Sefnit click fraud method is a departure from the method previously used back in 2011. This new, stealthier methodology is believed to be largely responsible for Sefnit being able to evade AV vendor detection during the last couple of years,” he added.

sefnit32-620x319

Who’s behind it? Trend Micro‘s TrendLabs ties Mevade to a specific criminal gang operating out of Ukraine and Israel.

How does it infect systems? It seems to hide inside of other programs. TrendLabs says they have seen adware downloaded through the Mevade botnet. Microsoft says they have seen it silently install as part of an application called “File Scout”, and there are strong indications that the same programmer(s) wrote Meade/Sefnit and File Scout.

About FastFlux

Owner of ZeroSecurity, interested in programming, malware analysis and penetration testing. If you would like to write for the ZeroSecurity team, please use the contact form above.

Check Also

Silent OS 3.0 for Blackphone Completely revamped

Version 3.0 migrates Silent OS to Android Marshmallow 6.0.1 and delivers the Android safety patch …