Malware uses Windows constraints policies

Researchers from Trend Micro discovered BKDR_VAWTRAK a banker malware. This malicious program uses the Windows Restriction Policies (SRP) policies to restrict the privileges of security software, including its security Trend Micro

malware

Το SRP είναι ένα χαρακτηριστικό που προστέθηκε στα λειτουργικά Windows XP και Windows Server 2003 και διαχειρίζεται μέσω του Group Policy. Έχει σχεδιαστεί για να επιτρέπει στους διαχειριστές να περνάνε στη μαύρη λίστα ή στη λευκή λίστα ειδικά εκτελέσιμα προγράμματα, ή να περιορίζουν τους μη προνομιούχους .

Of course this is not the first time that SRP is used by malicious software.

SRP can also be used for Local Policy Editor in any version of Windows:
sickle

Given that these policies now translate into registry keys ( keys) on the systems in use, it is possible to create registry keys directly, which Trend Micro reports the malware does. The above example shows the registry keys created in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\safer\codeidentifiers.

When the tries to run the executable , is blocked by Windows:

Aug-

This way the malware takes control of the computer as it only executes the files it wants. Possibly an updated software it could find the malware, but the malware has blocked it.

Ironically, Microsoft's article on TechNet states in the description of the SRP on the day of its release (in 2002) how it can be used to "fight viruses." Microsoft for ever!

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

One Comment

Leave a Reply

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).