The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
10/27/2014

Trojan.Alnaddy

Type:  Trojan
Discovered:  27.10.2014
Updated:  27.10.2014
Affected systems:  Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
AV Vendor:  Symantec

Description:

Trojan.Alnaddy is a Trojan horse that may download threats onto the compromised computer.

The Trojan may be downloaded and executed manually.

Once executed, the Trojan creates the following files:
  • %ProgramFiles%\Universal Updater\settings.json
  • %ProgramFiles%\Universal Updater\UpdaterService.exe

It then creates the following registry entries:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Universal\"aid" = "1001"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Universal\"dt" = "23102014"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Universal\"geo" = "[GEO]"
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater\"Type" = "10"
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater\"Start" = "2"
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater\"ErrorControl" = "1"
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater\"ImagePath" = "%ProgramFiles%\Universal Updater\UpdaterService.exe"
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater\"DisplayName" = "Universal Updater Service"
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater\"ObjectName" = "LocalSystem"
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater\"Description" = "Keeps your computer synchronized with the latest software updates."
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater\Security\"Security" = "[BINARY DATA]"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater\"Type" = "10"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater\"Start" = "2"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater\"ErrorControl" = "1"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater\"ImagePath" = "%ProgramFiles%\Universal Updater\UpdaterService.exe"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater\"DisplayName" = "Universal Updater Service"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater\"ObjectName" = "LocalSystem"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater\"Description" = "Keeps your computer synchronized with the latest software updates."
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater\Security\"Security" = "[BINARY DATA]"

Next, the Trojan creates a service with the following properties:
  • Display name: Universal Updater Service
  • Image path: %ProgramFiles%\Universal Updater\UpdaterService.exe
  • Description: Keeps your computer synchronized with the latest software updates.

It then creates the following registry subkeys to register itself as a service:
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UniversalUpdater
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UniversalUpdater

Once executed, the Trojan starts an installation wizard which may ask user to install a toolbar. The Trojan may also install additional software on the compromised computer.

The Trojan may also connect to the following remote location:
  • [http://]update.data-url.com[REMOVED]

The Trojan then downloads a configuration file to tell it where to download further potentially malicious files.

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015