• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Free Trial
  • Contact us
  • Blog
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Products
    • Product
      • Cisco Umbrella Cloud Security Service
      • Cisco Umbrella Investigate
      • Product Packages
      • Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Interactive Intelligence
      • Cloud-Delivered Firewall
    •  
    • Webinar signup
  • Solutions
    • By Need
      • Protect Mobile Users
      • Fast Incident Response
      • Web Content Filtering
      • Shadow IT Discovery & App Blocking
      • Unified Threat Enforcement
      • Reduce Security Infections
      • Secure Direct Internet Access
      • Securing Remote and Roaming Users
    • By Network
      • Protect Guest Wi-Fi
      • SD-WAN Security
      • Off-Network Endpoint Security
    • By Industry
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
      • Our Customers
      • Customer Stories
    • Ransomware Defense for Dummies book
  • Why Us
    • Fast Reliable Cloud
      • Cloud Security Infrastructure
      • Cloud Network Status
      • Cloud Network Activity
      • Recursive DNS Services
      • Top Reasons to Trial
      • Getting Started
    • Unmatched Intelligence
      • Cyber Attack Prevention
      • Interactive Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco SD-WAN
    • Navigation-dropdown-promo-free-trial_102820
  • Resources
    • Content Library
      • Top Resources
      • Analyst Reports
      • Case Studies
      • Customer Videos
      • Datasheets
      • eBooks
      • Infographics
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Cisco Umbrella Blog
      • Latest Posts
      • Security Posts
      • Research Posts
      • Threats Posts
      • Product Posts
      • Spotlight
    • For Customers
      • Support
      • Customer Success Hub
      • Umbrella Deployment Hub
      • Customer Success Webinars
      • What’s New
      • Cisco Umbrella Studio
  • Trends & Threats
    • Market Trends
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
      • Secure Access Service Edge (SASE)
    • Security Threats
      • Ransomware
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
    •  
    • 2020 Cybersecurity trends
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Become a partner
  • Free Trial Signup
  • Umbrella Login
  • Cloudlock Login
  • Contact Us
Threats

New Malware Attacks On The Threat Horizon

By Vinny LaRiza
Posted on April 1, 2015
Updated on October 15, 2020

Share

Facebook0Tweet0LinkedIn0

At OpenDNS Security Labs we thrive on continual innovation. We look at our extensive data collection network built on top of a very large security infrastructure and use this data to predict what’s coming next.  We’re a team of world-class engineers, mathematicians, and security researchers, and we’re taking an innovative and proactive approach to security research. It’s often stated that being a DNS company puts us in a bleeding edge position from a security standpoint as we are able to harness tons of data regarding internet activity and discover and predict new and interesting threats by analyzing patterns in the data that we receive. When you’re the tip of the spear, you end up running into a lot of new and unique threats that are unrecognized throughout the security community. Listed are a few of the top recognized unique threats in Q1 of 2015:

Win32.Siesta

A simple botnet attack that spreads by infecting all EXE files found in drives C to Z, which then causes your computer to slow down considerably (almost as if it’s in ‘sleep’ mode) consistently between the hours of 2pm and 4pm CST. This botnet infection was discovered by OpenDNS Labs early this year, however further investigation would reveal that this attack has been around for much longer. The location of this attack reportedly originated in Mexico, the Mediterranean and also certain parts of Southern Europe.
Screenshot 2015-04-01 07.16.08

Facebook.Access.Recursion Trojan (Win.32/F.arT)

A malicious script (popularly referred to as the Trojan Malodorous) designed to hijack Facebook activity, this Trojan is usually seen in web pages that perform “click-jacking,” forcing users to “like,” share” or “comment” on pages in Facebook without their knowledge. It has been reported that many who are infected with this malware tend to, for whatever reason, deny it’s existence and proclaim that it must have come from someone else’s computer. While OpenDNS protects against this threat, it’s also been mythicized that lighting a match and blowing it out near the infected computer will mostly mask the effects of the Trojan.

Screenshot 2015-04-01 07.17.08

Paleo Botnet

A direct derivative of the Palveo botnet, this attack works in a very similar fashion. It is a standard botnet that, once executed, creates registry entries to ensure that it runs every time Windows starts. The worm then crossfit’s a back door on the compromised computer and attempts to connect to an IRC server to receive commands, such as oddly deleting any files containing the words “Dairy,” “Grains” or “Alcohol.” This attack was initially created with the intention of improving the computer’s overall status, appearance, and to give the Network Admin something to talk about at social events, however it has since been declared an annoying nuisance by many computer scientists.
Screenshot 2015-04-01 07.18.39

CryptoWhopper

New variants of Ransomware Trojans are still actively being created and released, as many other security solutions do not have an answer for this particular variety of malware. When activated, CryptoWhopper encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware’s control servers. The malware then displays a message which offers to decrypt the data if a burger is eaten by the stated deadline, and also threatens to delete the private key if the deadline passes.

Screen Shot 2015-03-31 at 3.19.34 PM

Stay tuned for our detailed report on each of the aforementioned advanced paradigm-shifting cyber threats.

Previous Post:

Previous Article

Next Post:

Next Article

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Cisco Umbrella Blog
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Cisco Umbrella

Learn more

  • Events
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2021 Cisco Umbrella