Tigger Trojan Keeps Security Researchers Hopping

March 5, 2009 – 5:35 AM

It’s malware that actually removes other malware from its victims’ PCs. And so far, nobody is exactly sure how it’s being distributed.

Security experts this week are buzzing about a new Trojan called Tigger.A, also known as Syzor. The data-stealing malware has quietly claimed about 250,000 victims since it was first spotted by security intelligence company iDefense in November, according to a Washington Post report.

Tigger.A allows attackers to gain access to “administrator” privileges on Windows machines, even if the user himself doesn’t have those privileges, according to the report. It takes advantage of a vulnerability (MS08-066) in Windows’ “privilege escalation” feature that Microsoft revealed — and patched — in October.

“Tigger removes a long list of other malicious software titles, including the malware most commonly associated with Antivirus 2009 and other rogue security software titles,” the report says. “iDefense analysts say this is most likely done because the in-your-face, “Hey, your-computer-is-infected-go-buy-our-software!” type alerts generated by such programs just might tip off the victim that something is wrong with his system, and potentially lead to all invaders getting booted from the host PC.”

The Trojan also installs a rootkit on the infected system that loads even when the system is started up in safe mode, iDefense researcher Michael Ligh says in the report. “The scary part is, none of us are really sure how Tigger is even being distributed,” he said. “I look at a lot at info-stealing malware, and this is the first one I’ve seen in a while that goes to the trouble of removing other pieces of malware.”

Tigger’s ability to collect user data also is impressive, IT expert Michael Kassner notes in his blog.

“The Trojan uses a privilege escalation vulnerability which is almost an exact replica of the public exploit on Milw0rm,” the blog observes. “It disables Windows Defender, Windows Firewall, Outpost, Avira, Kaspersky, AVG, and CA products in unique ways such as posting malformed messages to windows owned by the daemon processes, sending special byte codes over named pipes, and using the products’ own API. It installs a rootkit that runs in safe mode [and] disables kernel debuggers.

Source:
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=215800583&cid=RSSfeed

You must be logged in to post a comment.