December 14, 2015 By Douglas Bonderud 2 min read

According to researchers from security firm FireEye, a new strain of malware called LATENTBOT has been discovered on machines across the U.S., U.K., South Korea, Brazil and Poland this year. The backdoor virus gives attackers access to virtually anything they want on a network and is nearly impossible to detect. In fact, the bot’s obfuscation is so good that it’s been lurking around corporate machines for the better part of two years. Here’s a quick rundown.

Right Under Your Nose

As reported by SecurityWeek, LATENTBOT is focused on remaining undetected and has largely succeeded; some of its earliest infections data back to 2013. This is the Holy Grail for malware-makers: the ability to craft code that even up-to-date, real-time antivirus solutions can’t detect, much less eliminate. The new backdoor is designed to leave “barely any traces on the Internet, is capable of watching its victims without ever being noticed and can even corrupt a hard disk, thus making a PC useless.”

It achieves this goal through a six-stage obfuscation process and by operating purely in memory on an infected system. It also has the ability to scan for cryptocurrency wallets using the Pony Stealer 2.0 malware plugin. The malware regularly implements new layers of obfuscation to keep antivirus solutions and IT professionals unaware of its presence.

While the malware isn’t targeted, it will avoid certain versions of Windows such as Vista or Server 2008. Once systems are infected, the code only stays in memory long enough to cause havoc, which may include:

  • Hiding desktop applications;
  • MBR wiping;
  • Ransom-locking the desktop;
  • Stealing information via Pony malware.

Despite the sophistication of LATENTBOT malware, however, attackers still rely on infected emails to carry their payload. Their weapon of choice is an infected Word document that uses the well-known Microsoft Word Intruder (MWI) to contact a MWISTAT server and give cybercriminals total access.

Common Problems With a Backdoor Virus?

According to The Straits Times, hidden malware is also making its way onto mobile devices: The Association of Banks in Singapore (ABS) is warning Android users to watch out for what appears to be a WhatsApp update but in fact carries a malware payload that attempts to grab user credit card data. It does so by intercepting the one-time password (OTP) sent by banks via SMS so users can access their accounts online. Much like LATENTBOT, this malware hides in plain sight — luckily, however, its history isn’t quite as long.

The New Threatscape

Brute force is passé. Obvious, high-volume attacks simply don’t have the same results they once did, so malware-makers have turned a corner. Simple yet sophisticated, lightweight apps are the new threatscape: They get in without being noticed, grab what they want and disappear.

It’s a wake-up call for companies. What’s happening on corporate networks is much more relevant than what’s installed behavior, far more than bad code, is the hallmark of this new backdoor virus and other emerging risks.

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today