BrideX worm bites Kasperky Labs

A group of hackers launched a successful attack on the Web server of Russian computer security firm Kaspersky Labs Ltd. on Friday, managing to implant and distribute a copy of the recently discovered Bridex worm in the company's e-mail newsletter.

The successful exploitation of Kaspersky's e-mail list followed what the company described in a statement as a "massive attack" against its Web server on Friday evening, according to Denis Zenkin, head of corporate communications at the Moscow-based company.

A statement posted on Kaspersky's Web site said that the attack began on Thursday night, November 7.

According to Zenkin, the attackers used a sophisticated and "exotic" attack to compromise the company's Web server and gain access to a folder containing mail messages sent out by the company.

From those messages, the attackers were able to obtain the distribution list for the company's e-mail newsletter. A copy of that newsletter was distributed to Kaspersky's customers along with an attached executable file containing the Bridex worm.

"Our IT security people were amazed that hackers got the idea for this kind of hack attack," Zenkin said.

Zenkin refused to provide details on the attack, citing concerns that other members of the hacker community would use that information to carry out further attacks. Zenkin did disclose that Kaspersky's Web server runs the FreeBSD operating system, a version of UNIX, and the common Postfix e-mail server software.

Hackers were not able to gain access to Kaspersky's e-mail address book, nor were they able to penetrate areas of the Web server containing virus signatures for Kaspersky's antivirus software, Zenkin said.

Zenkin declined to say whether antivirus definitions were posted in a more secure area of the server, however, saying only that they were located in different "territories" of the server that were not affected by the attack.

Kaspersky's virus definitions use digital signatures that are verified by the company's software before they are installed and used. Tampering with Kaspersky's virus definitions -- for example, attempting to substitute malicious code for a signature -- would be detected and rejected by the company's software, Zenkin said.

According to Zenkin, Kaspersky knows of no customers who were infected by the newsletter. Kaspersky staff first noticed the attack and took corrective action within minutes of the exploit, Zenkin said.

Nevertheless, the attack produced the unusual scenario of an antivirus vendor's software being used to thwart an attack launched from its own servers. It was an embarrassing fact that more than a few of Kaspersky's customers brought to the company's attention, Zenkin admitted.

Since the attack, Kaspersky has closed the security loophole exploited by the attackers and taken other steps to ensure that future attacks are not successful. In addition, the company inspected the entire contents of its Web server and claims that the e-mail newsletter was the only affected component of its Web site, Zenkin said.

The company traced the attacks to a group of hackers in Mexico, but so far has no concrete evidence pointing to specific individuals, according to Zenkin.

The Bridex worm, also known as "W32/Braid.A" or "I-Worm.Bridex," was first identified in early November and arrives in an e-mail message, typically contained in an attachment named README.EXE.

When recipients double click on the attachment, the worm copies a variant of the FunLove virus to the local system with the name BRIDE.EXE, alters the machine's system registry so that the virus is relaunched each time Windows starts, scans the user's Outlook address book and e-mails copies of itself to any addresses it finds.

Antivirus software vendors including Kaspersky have published updated virus signatures to detect Bridex.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?