NOTICE: Possible trojan on C&F

A few minutes ago I got an email from a user who believes she picked up the trojan Bloodhound 131 on this forum. I’ve asked Rich to look into it. At this point, I can’t be sure if the problem rests in the forum code. I don’t know enough about this at this point to tell you much more. I believe it may be true that this only affects Windows users using IE, but I’m not sure. In the meantime, you may want to stay off the board for awhile, or you may want to be sure you’re antivirus stuff is updated and proceed. I’ll keep you posted. As a precaution, I’m going to create a thread on the external poli board and I’ll post an update there when I learn more about it. Those of you who want to stay off this board until the possible problem is resolved can check that forum and get updates.

I may be overreacting, but given my ignorance about this, seems like a good idea.

http://cnfpoli.informe.com/

I’m confused. Everything I was taught growing up indicated that Trojans were a good way to keep OUT of trouble.

Sorry… yeah, thanks, Dale. You can’t be too careful.

Dale,

I had to get a whole new hard drive last week and I let them explain it to me but I’m not computer-fluent, so I don’t know quite what was wrong, but basically I got a computer bug from somewhere. It makes sense now that it could have been here. I’m here all the time.

Also Dale, you might want to post this warning on other forums too.

Yes, I too have had similar behavior. My A-Hole-L warned me and provided me with a means to block and remove it… let’s see if it works.

Trend Micro Office scan says it’s EXPL_EXECOD.A I get a virus alert when I bring up a chiff page.

Well, we still don’t know if it came from here. I don’t want to over- or under-react.

In the meantime, Firefox is probably a good idea.

But isn’t this forum hosted on a UNIX server?

reg

Bloodhound is a trojan that uses an exploit in Microsoft’ animated cursors. It has been all over the news this week.

I haven’t seen any use of animated cursors on this site.

Info from Symantec

"Bloodhound.Exploit.131 is a heuristic detection for a zero-day vulnerability affecting Microsoft Animated Cursor (ANI) file parsers (as described in Bugtraq ID 23194). The exploit can be triggered by viewing an HTML page referencing an ANI file in a vulnerable version of Internet Explorer.

Applies to: Internet Explorer 6, Internet Explorer 7"

Microsoft have already released a patch to cover the hole.

Mukade

hi rich,

…was there really anything wrong?



I am old…and slow…and it just keeps getting worse!

I had to remove that very trojan from my PC twice yesterday before I downloaded the security update from Microsoft.
I wondered where I kept picking it up, as I only visited Hotmail, CNN, TV Guide Online, and here.

Or at least a good Virus Protection software-McAfee picked the trojan up for me 3 times yesterday as I was trying to access Chiff, and my updates on Windows are automatic, so that update should have been already in place, but I guess it wasn’t.

Glad to see we’re back in business now!

Okay, everybody, I found the Trojans. Don’t worry. I think they have an Achilles heel … or maybe not. :boggle:

djm

I think it’s highly suspicious that this sort of thing should come right after everyone was discussing antivirus software . . . hmmm . . .

My Symantec blocked it three times yesterday. It attempted to enter my system every time I clicked on a new thread.

Look:

Source: C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\KX2V0LAJ\ifr[1].htm
Risk category: Virus
Overall Risk Impact: High
Click for more information about this risk : Downloader
Action taken: Blocked
Discovered: June 8, 2001
Updated: February 13, 2007 11:50:11 AM
Type: Trojan Horse
Infection Length: varies
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP



Downloader connects to the Internet and downloads other Trojan horses or components.

Downloader does the following:
Goes to a specific Web or FTP site that its author created and attempts to download new Trojans, viruses, worms, or their components.
After the Trojan downloads the files, it executes them.

Note: Virus definitions dated June 1, 2006 or earlier may detect this threat as Download.Trojan.
ProtectionVirus Definitions (LiveUpdate™ Weekly) June 13, 2001
Virus Definitions (Intelligent Updater) June 11, 2001
Threat AssessmentWildWild Level: Low
Number of Infections: 0 - 49
Number of Sites: 0 - 2
Geographical Distribution: Low
Threat Containment: Easy
Removal: Easy
DamageDamage Level: Low
DistributionDistribution Level: Low


Downloader does the following:
Goes to a specific Web or FTP site that its author created and attempts to download new Trojans, viruses, worms, or their components.
After the Trojan downloads the files, it executes them.

Lambchop - that’s exactly the warning I got with Symantec, too.

I just wiped out my temp file - since that’s where it was trying to go.

It’s all pretty odd. SOMETHING happened, for sure. The problem is that Rich, who knows phpbb thoroughly, can’t find any evidence of any changed php files. So, there’s nothing to fix. I wonder if whatever got hacked got un-hacked. I dunno.

So, you know,

I would recommend that we put the AE-35 unit back in operation and let it fail. It should then be a simple matter to track down the cause. We can certainly afford to be out of communication for the short time it will take to replace it.

Break

I wonder if it came in inside one of the ad frames, or if C&F is big enough that it uses load balancing and only some of the servers were affected?

Asus.com also got hit via that second route.

http://isc.sans.org/diary.html?storyid=2582 might be worth reading.

–James

Dale,Dale,Dale - c’mon - it was the Crystal People!!!

Open the pod bay doors, HAL.

djm