{"id":422,"date":"2013-06-13T00:00:00","date_gmt":"2013-06-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/13\/mbr-wiping-malware-targets-german-victims\/"},"modified":"2021-12-30T11:37:17","modified_gmt":"2021-12-30T11:37:17","slug":"mbr-wiping-malware-targets-german-victims","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/13\/mbr-wiping-malware-targets-german-victims\/","title":{"rendered":"MBR-wiping malware targets German victims"},"content":{"rendered":"<p style=\"margin: 0px;\">A new MBR-based hack is now targeting German users, who are at risk of having their systems rendered unusable by malware being sent via spam messages. Trend Micro recently uncovered what it terms a \u201cnoteworthy backdoor\u201d as an attached file in certain spam variants sent to German recipients. The spam sample the security firm found tells recipients they have to pay a certain debt, the details of which are contained in the attachment. Like any backdoor, it (BKDR_MATSNU.MCB) performs certain malicious commands, which include gathering machine-related information sent to its command-and-control (C&amp;C) server. \u201cThis particular malware, on top of its ability to remotely control an affected system, is able to wipe out the Master Boot Record \u2013 a routine that had previously caused a great crisis in South Korea,\u201d noted Lenart Bermejo, threat response tech lead at Trend Micro.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">McAfee\u2019s latest Quarterly Threats Report noted a surge in MBR attacks, where the goal is to infect a machine\u2019s storage system, and from there take control of the entire device.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The German-targeted malware doesn\u2019t stop at wreaking of MBR havoc though: another feature is the backdoor\u2019s capability to lock and unlock a screen. \u201cThis locking of screen is definitely a direct copy from ransomware\u2019s playbook, in which the system remains completely or partially inaccessible unless the victim pays for the ransom,\u201d Bermejo said.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Another possible scenario is a version of the MBR exploit that is integrated with the screen blocking routine, which will make the screen locking command easier to execute.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.infosecurity-magazine.com\/view\/32866\/mbrwiping-malware-targets-german-victims\">http:\/\/www.infosecurity-magazine.com\/view\/32866\/mbrwiping-malware-targets-german-victims<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-422","post","type-post","status-publish","format-standard","hentry","category-malware"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=422"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/422\/revisions"}],"predecessor-version":[{"id":2909,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/422\/revisions\/2909"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}