Only through inactive action does one become a victim; by exercising proactive action against evil one walks in their own power creating resistance to that which chooses to destroy humanity and the preciousness of life. Fight America; don't become a victim to the evil that is destroying our world! _Donald F. Truax (Tough times don't last, tough people do)
Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]
Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]
Cost of War to the United States
Is the NSA Conducting Electronic Warfare On Americans?
Harvard Journal of Law & Public Policy - National Security Archive FOIA Audit
Seymour Hersh on Obama, NSA and the 'pathetic' American media - IBM & "Death's Calculator"
What is the Hegelian Dialectic? - The Guardian's NSA Files - Church Committee Reports
The Hegelian Dialectic - U.S. Pavlovian Conditioning - NUREMBERG TRAILS PROJECT
Hegel for Beginners, by Llyod Spencer and Andrzej Krauze - Project MUSE - Operation Gladio
The Edward Bernays "Propaganda" Essays - SLHS Series
Free E-Book Download: Edward Bernays, "Propaganda"
Deconstructing Edward Bernays' 'Propaganda' (Part 1) - (Part 4) - (Part 7) - (Part 10)
Deconstructing Edward Bernays' 'Propaganda' (Part 2) - (Part 5) - (Part 8)
Deconstructing Edward Bernays' 'Propaganda' (Part 3) - (Part 6) - (Part 9)
Wednesday, October 19, 2011
Federal Trojan's Got A "Big Brother" -- Trojan Update-Button
About two weeks ago, the German Chaos Computer Club (CCC) has published an analysis report of a backdoor trojan that they claim had been used by German police during investigations in order to capture VoIP and IM communication on a suspect's PC.
Our friends over at F-Secure published a blog post last week where they wrote about another file that, according to them, seemed to be the dropper component of the trojan. They were kind enough to share the MD5 hash of the file, so we could pull it from our collection. Stefan and I took a closer look.
The dropper carries five other binaries in its resource table, so there are six components in total – each with a different purpose – all of which have been analyzed by us. Amongst the new things we found in there are two rather interesting ones: firstly, this version is not only capable of running on 32 bit systems; it also includes support for 64 bit versions of Windows. Secondly, the list of target processes to monitor is longer than the one mentioned in the CCC report. The number of applications infected by the various components is 15 in total.
Target Applications
Previous discussions of R2D2 mention Skype as a target application that is monitored by the trojan. The version analyzed by us indicates that Skype is targeted as well, but also all common web browsers, various instant messaging applications and voice-over-ip software, such as ICQ, MSN Messenger, Low-Rate Voip, paltalk, SimpPro, sipgate X-Lite, VoipBuster and Yahoo! Messenger. The list of process names is:
* explorer.exe
* firefox.exe
* icqlite.exe
* lowratevoip.exe
* msnmsgr.exe
* opera.exe
* paltalk.exe
* simplite-icq-aim.exe
* simppro.exe
* sipgatexlite.exe
* skype.exe
* skypepm.exe
* voipbuster.exe
* x-lite.exe
* yahoomessenger.exe
Code injection into target processes is carried out by the dropper, two user-mode components and also a 32 bit kernel driver with extended functionality compared to the version previously analyzed, which only provided an interface for registry and file system modifications.
All target processes we found in the different user-mode components are also covered by the driver.
There are two different DLL injection methods implemented. One works by registering the user-mode library in the Windows registry as an AppInit DLL so that it gets loaded during process creation. The second creates a remote thread in already running processes and injects a piece of position-independent code that maps the mfc42ul.dll file, one of the user-mode modules, into the target process memory.
64 bit Kernel Driver
When the dropper installs the kernel-mode component, it derives the resource name from the architecture (either 32 or 64 bit) and installs an appropriate driver:
Contrary to the 32 bit version, the 64 bit driver does not contain any process infection functionality but only provides a rudimentary privilege escalation interface through file system and registry access. Similar to its brother, it creates a device and implements a basic protocol for communicating with user-mode applications.
It is well known that 64 bit kernel modules must carry a valid digital signature that can be checked by the operating system, or loading the driver fails. The driver that comes with the rootkit contains a 1024 bit RSA certificate (fingerprint e5445e4a 9c7d24c8 43f0c669 e2a8d3a1 78cf7fa8), issued by Goose Cert on April 11, 2010. However, the certificate must be installed and the trustworthiness must be confirmed in order to make the driver load.
All components are detected by Kaspersky as variants of the R2D2 trojan/rootkit. The dropper was previously heuristically detected and blocked by us as an invasive program.
"And Ye Shall Know The Truth And The Truth Shall Set You Free"
WAKE UP AMERICA....ITs OUR COUNTRY!!!
Love "Light" and Energy
_Don
References: Facebook Worm Found to Serve ZeuS - No Smit!
Apple iTunes “Flaw” Allowed Government Spying for 3 Years - Woooo Hoooo
Surveillance Company Says It Sent Fake iTunes, Flash Updates LOL LOL LOL
As Washington Renews Military Threats Against Iran, Cyber Attacks Escalate
Cuba says U.S. behind illegal wireless networks
Anonymous' Fawkes Virus Found on Facebook LOL LOL LOL
Microsoft Issues [Fix it or Unfix it] for Duqu 0-Day Vulnerability in Windows Kernel
China: Don't blame us for U.S. satellite hacks :o
600,000 hacks a day, welcome to Facebook LOL LOL LOL
Example: What happens when ya hit that trojan-update button!
'Government and companies NSA/SAIC/DIA routinely abuse data privacy'
Using Stuxnet and Duqu as Words of Mass Disruption
NSA Open Sources Google Database Mimic
Federal Trojan
Magic Lantern
DODs New Stuxnet 2.0 'Cyber-Surveillance' Malware Threat - :o TOP
Exploit Kits – A Different View
Chaos Computer Club analyzes government malware
More Info on German State Backdoor: Case R2D2
Mass Injection Attack Targets ASP.NET Sites
Widespread LizaMoon Web Attacks Push Rogue Antivirus
TOPs Blogger Role
-
Russian jet catches fire during landing (VIDEO)15 minutes ago
-
-
-
-
-
-
-
WATCH: CN Live! — ‘Escalation’3 hours ago
-
-
-
-
-
The Vietnam War (1955-1975)5 hours ago
-
-
-
-
-
-
-
-
-
-
-
What’s Changed?5 days ago
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Never forget and never give up.2 months ago
-
-
Hello world!3 months ago
-
-
-
-
Bob Graham, 9/11, the FBI and me7 months ago
-
Hello world!9 months ago
-
-
LearningMusic1 year ago
-
-
Dr. Graeme MacQueen (1948-2023)1 year ago
-
-
-
-
-
-
My Farewell Announcement3 years ago
-
-
Hello world!3 years ago
-
-
-
Podcast: From Divorce to Besties3 years ago
-
FederalJack Update4 years ago
-
-
-
-
-
-
-
-
-
-
Hello world!7 years ago
-
The Blue State Model8 years ago
-
-
China ramps up charges against Zhou9 years ago
-
-
-
-
Reply to Jonathan Cook10 years ago
-
-
Amazing Pictures from around the world.11 years ago
-
-
Race for Iran Is Going to Tehran11 years ago
-
-
UK Parliament12 years ago
-
News13 years ago
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
No comments:
Post a Comment