Recently, we have observed a new backdoor family which we've called
BLYPT. This family is called BLYPT because of its use of binary
large objects (blob) stored in the registry, as well as encryption.
Currently, this backdoor is installed using Java exploits; either
drive-by downloads or compromised web sites may be used to deliver
these exploits to user systems. Our research shows that the servers
behind these attacks are mainly centered in Romania and Turkey.
Currently, this threat is primarily hitting users in the United
States; however it seems that consumers (as opposed to businesses)
are the most affected.
via [1]BLYPT: A New Backdoor Family Installed via Java Exploit |
Security Intelligence Blog | Trend Micro.
__________________________________________________________________
My original entry is here: [2]BLYPT: A New Backdoor Family Installed
via Java Exploit | Security Intelligence Blog | Trend Micro. It posted
Mon, 23 Sep 2013 16:20:45 +0000.
Filed under: InfoSec, java, malware, vulnerability,
References
1.
http://blog.trendmicro.com/trendlabs-security-intelligence/blypt-a-new-backdoor-family-installed-via-java-exploit/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29
2.
https://www.prjorgensen.com/2013/09/23/blypt-a-new-backdoor-family-installed-via-java-exploit-security-intelligence-blog-trend-micro/