Two malware programs help each other stay on computers

Microsoft says the Vobfus and Beebone malicious software programs are proving to be a pain
  • Jeremy Kirk (IDG News Service)
  • — 01 July, 2013 05:20

Two malicious software programs that help each other stay on computers are proving difficult to remove.

The programs work together by alternately downloading slighter different variations of the other in an attempt to evade antivirus software, wrote Hyun Choi of Microsoft's Malware Protection Center, on Sunday.

One of the malware programs, called Vobfus, was detected in September 2009. It is known as a downloader, or a program that downloads other pieces of code.

Once Vobfus infects a computer, it downloads from a remote command-and-control server a program called Beebone, which is another kind of downloader that installs other malicious programs on a computer. The two work together, downloading variants of the other that are not immediately detected by antivirus products, Choi wrote.

"This cyclical relationship between Beebone and Vobfus downloading each other is the reason why Vobfus may seem so resilient to antivirus products," Choi wrote. Updated antivirus products may detect one variant present on the system; however, newer downloaded variants may not be detected immediately."

Other malware programs have been known to update themselves once a computer is infected. But if the malware is detected and removed, the targeted computer would have to be infected again by an attacker. The approach of Vobfus and Beebone makes it more likely the computer will remain infected.

Vobfus is also a worm that copies itself to removable drives. It uses the autorun function that, if enabled on a computer, causes Vobfus to automatically run and infect Windows computers.

"In the wild, we have observed that Vobfus maintains a very successful removable-drive infection rate," Choi wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags: security, Microsoft, malware

JP Morgan to invest £150 million on boosting cyber security

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

SECURE Web Gateway

Balancing the requirement for strong network security with the need to harness collaborative web technologies is essential for business growth.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.