Microsoft fights gaming Trojan menace

Resident Evil


Microsoft is claiming big successes in its efforts to to rescue gamers from malware.

The latest (June) edition of Microsoft's Malicious Software Removal Tool (MSRT) included a device to remove password stealers from infected machines. MSRT is a basic anti-malware tool designed to zap prevalent forms of malware. Signature updates to the optional package are updated at the same time Microsoft releases security patches, the second Tuesday of every month (Patch Tuesday).

Historically the MSRT utility was created to mop up instances of worm infections from the likes of Nimda, but its role has expanded over the years to include attempts to control the spread of the Storm worm (Trojan) and beyond. The June update to the tool added detection for password stealing Trojans of a type commonly used to grab online gaming passwords.

Strains of malware, such as Taterf, steal login credentials for online games (Lineage Online and World of Warcraft are among the most popular targets). Many of the Trojans originate in eastern Asia (particularly China).

Taterf spreads across network shares. If you plug a USB stick into an infected machine, that gets the pox too. Another prevalent Trojan - Frethog - uses browser exploits.

Neither technique is particularly advanced. Nonetheless both Trojans have become a big hit over recent weeks, spreading farther than anybody previously thought, according to Microsoft's clean-up stats.

After adding detection for Taterf to its MSRT tool on 10 June, Redmond cleaned-up Taterf component infections from more than 700,000 machines on the first day and 1.27 million in a little under a fortnight. Another strain of password stealing Trojan - Frethog - was removed from 200,000 machines on day one and 652,000 machines by last Friday.

By comparison, the Storm worm was removed from under 350,000 machines in the first month that detection was added to MSRT.

Matt McCormack, a security researcher at Microsoft and gamer, posits the theory that part of the reason for the high incidents of infection might be that gamers avoid running anti-virus software out of concerns it might impair the performance of their machines. This risk is compounded by the fact that many gamers fail to practice safe computing. "Downloading dodgy copies of games and the cracks to match make you much more likely to get infected," McCormack notes in a post to Microsoft's threat response and research blog here. ®

Similar topics


Other stories you might like

  • AMD claims its GPUs beat Nvidia on performance per dollar
    * Terms, conditions, hardware specs and software may vary – a lot

    As a slowdown in PC sales brings down prices for graphics cards, AMD is hoping to win over the market's remaining buyers with a bold, new claim that its latest Radeon cards provide better performance for the dollar than Nvidia's most recent GeForce cards.

    In an image tweeted Monday by AMD's top gaming executive, the chip designer claims its lineup of Radeon RX 6000 cards provide better performance per dollar than competing ones from Nvidia, with all but two of the ten cards listed offering advantages in the double-digit percentages. AMD also claims to provide better performance for the power required by each card in all but two of the cards.

    Continue reading
  • Google opens the pod doors on Bay View campus
    A futuristic design won't make people want to come back – just ask Apple

    After nearly a decade of planning and five years of construction, Google is cutting the ribbon on its Bay View campus, the first that Google itself designed.

    The Bay View campus in Mountain View – slated to open this week – consists of two office buildings (one of which, Charleston East, is still under construction), 20 acres of open space, a 1,000-person event center and 240 short-term accommodations for Google employees. The search giant said the buildings at Bay View total 1.1 million square feet. For reference, that's less than half the size of Apple's spaceship. 

    The roofs on the two main buildings, which look like pavilions roofed in sails, were designed that way for a purpose: They're a network of 90,000 scale-like solar panels nicknamed "dragonscales" for their layout and shimmer. By scaling the tiles, Google said the design minimises damage from wind, rain and snow, and the sloped pavilion-like roof improves solar capture by adding additional curves in the roof. 

    Continue reading
  • Pentester pops open Tesla Model 3 using low-cost Bluetooth module
    Anything that uses proximity-based BLE is vulnerable, claim researchers

    Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.

    Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.

    Essentially, what happens is this: the paired smartphone should be physically close by the Tesla to unlock it. NCC's technique involves one gadget near the paired phone, and another gadget near the car. The phone-side gadget relays signals from the phone to the car-side gadget, which forwards them to the vehicle to unlock and start it. This shouldn't normally happen because the phone and car are so far apart. The car has a defense mechanism – based on measuring transmission latency to detect that a paired device is too far away – that ideally prevents relayed signals from working, though this can be defeated by simply cutting the latency of the relay process.

    Continue reading

Biting the hand that feeds IT © 1998–2022