Security Market Segment LS
Monday, 21 June 2021 11:54

Sophos uncovers curious “vigilante”-style cyberattack that blocks users of pirated software from reaching pirate sites

By

Ahoy, me mateys, there's no honour among thieves, as cyber attacks (which are illegal) target illegal software pirates from accessing infamous pirate site The Pirate Bay, who are presumably crying out the homophone "aaaaargghhhh" in frustration.

Sophos has published new research, “Vigilante Malware Rats Out Software Pirates While Blocking ThePirateBay,” which details what Sophos is "a curious cyberattack campaign that targets users of pirated software with malware designed to block access to websites hosting pirated software." 

We're told "the developers disguise the malware as cracked versions of popular online games such as Minecraft and Among Us, as well as productivity tool such as Microsoft Office, security software and others. The disguised malware is distributed via the BitTorrent platform from an account hosted on “ThePirateBay” digital filesharing website.

"Links to the malware are also hosted on Discord. Once installed, the malware blocks the victim’s access to a long list of websites, including many that distribute pirated software."

Unusual aspects of the operation uncovered by Sophos researchers include:

  • The attackers use an age-old approach of modifying the HOSTS file settings on an infected device to “localhost” a long list of websites, thereby blocking the user’s access to them. This approach is fairly easy to reverse, and Sophos researchers are unsure why the attackers used it
  • Some of the many hundreds of sites that are being “localhosted” by the malware are unrelated to pirated software and some were shut down or became inactive in or around 2012/2013
  • The malicious files are compiled for 64-bit Windows 10 and then signed with bogus digital certificates that wouldn’t pass more than a very rudimentary check

Once downloaded and installed by a user, Sophos reports "the malware hunts for files named 7686789678967896789678 and 412412512512512. If it finds them it stops any further launch of the attack. Sophos researchers believe this could be designed to prevent the malware operators from infecting their own computers while they work on the malicious code.

"The malware also triggers a fake error message to appear when it runs, which asks people to re-install the software. Sophos researchers believe this could be to allay suspicion among users who wonder why the program they received didn’t contain the installers they were expecting."

Andrew Brandt, principal threat researcher at Sophos, said: “Sometimes it is easy to see clearly what an adversary’s end game is and why they have chosen a particular approach to achieve it. This is not one of those times.

“On the face of it, the adversary’s targets and tools suggest this could be some kind of crudely-compiled anti-piracy vigilante operation.

"However, the attacker’s vast potential target audience – from gamers to business professionals – combined with the curious mix of dated and new tools, techniques, and procedures (TTPs) and the bizarre list of websites blocked by the malware, all make the ultimate purpose of this operation a bit murky. There may not even be an overall purpose to this attack at all.

"However, that doesn’t reduce the level of risk or the potential disruption for victims. To stay safe from such attacks, install a robust security solution that will spot such scams before they reach you, and avoid downloading pirated software or anything offering you suspiciously too-good-to-be true ‘legitimate’ software.”

Sophos offers addition info of mobile threats such as “fleeceware” apps that sneakily overcharge users, fake trading apps for Android and iOS and spyware.

Read 1853 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




IDC WHITE PAPER: The Business Value of Aiven Data Cloud Solutions

According to IDC, Aiven enables your teams to perform more efficiently, reduce direct infrastructure costs, and provide improved database performance, agility and scalability.

Find out how Aiven makes teams 48% more efficient, allowing staff to focus on high-value activities that drive real business results:

340% 3-year ROI – break even in 5 months (average)

37% lower 3-year cost of operations

78% reduction in staff time for database deployments


Download the IDC White Paper now

DOWNLOAD WHITE PAPER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Alex Zaharov-Reutt

Alex Zaharov-Reutt is iTWire's Technology Editor is one of Australia’s best-known technology journalists and consumer tech experts, Alex has appeared in his capacity as technology expert on all of Australia’s free-to-air and pay TV networks on all the major news and current affairs programs, on commercial and public radio, and technology, lifestyle and reality TV shows. Visit Alex at Twitter here.

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown:

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments