Security Hero Rotating Header Image

January, 2007:

CTC to Distribute Infoblox Solutions in Japan

CTC to Distribute Infoblox Solutions in Japan

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced that it has signed as a distribution partner ITOCHU Techno-Solutions Corporation (CTC) of Tokyo, Japan, a leading provider and systems integrator of networking solutions.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/iGoMhh18GlI/release.cfm

Tibs

Tibs

This is a large malware family (10000+ discrete detections) with a variety of components and functionality. The first variants of this series were seen as early as 2005. These trojans are designed to download and install a number of other trojans. How they are installed on a machine varies – some can be installed via malicious web sites, while others can be sent via mail or be found on the peer2peer networks. In a handful of documented cases this trojan has also been associated with child pornography. Below is a list of different Tibs-related malware and its functionality. Downloaders These variants usually install themselves as %SYSTEM%\kernels64.exe on the local machine; but some variants use names like kernels8.exe or kernels88.exe. They create registry keys to run from startup and every time Explorer is started. In addition, the Task Manager is disabled. Registry changes: HKLM\Software\Microsoft\Windows\CurrentVersion\Run “System"=%SYSTEM%\kernels64.exe HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices “SystemTools"=%SYSTEM%\kernels64.exe HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell"="Explorer.exe %SYSTEM%\kernels64.exe HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr"= 1 Payload: They download a set of malware components from a distribution site. These additional components are installed using random file names in the %SYSTEM% folder: %SITE%\proxy.exe : Downloader for more components %SITE%\search.exe : Downloader trojan %SITE%\tibs.exe : Downloader for a porn dialer %SITE%\tool.exe : Downloader for more components %SITE%\winlogon.exe : Installer for a rogue spyware application Some variants do not download directly, but instead access a PHP script which determines which file is to be downloaded. Usually information about the local machine processor and Windows version will be uploaded to the attacker at the same time. Email address harvesters: This type of component searches through local files and address books looking for email addresses and posts the findings to a malicious web site. These email addresses are certainly used for spam purposes. Mail proxies: By installing a mail proxy, the attacker can send mail through another person’s mailserver. This is very useful for a spammer. Machines infected with this type of trojan will have an open port 25 (SMTP). Peer-to-peer bot: Some variants are able to connect to other machines also infected and thus create networks of infected machines. A large amount of these files were spammed out on email shortly after the large storm that hit Europe in January 2007 and the malware was given the name Stormy by some. This is a remote-controllable trojan (bot). It carries with it a list of controlling IP addresses, which it can contact to fetch information about other infected machines, and also register itself as a new peer in the network. Many variants of this also install a rootkit to hide themselves.

Once run, it drops a file with the name wincom32.sys in the %SYSTEM% folder. It then registers this as a service. The trojan may also create a file called wincom32.ini, as well as download and install more malware. Registry changes: HKLM\System\CurrentControlSet\Services\wincom "ImagePath"="C:\WINDOWS\SYSTEM32\wincom32.sys" "DisplayName"="wincom32"

The trojan communicates with peers on ports 4000, 7871 and 11271. Email worm installation: Tibs-related malware may also be downloaded and installed by the Luder email worm/virus combo. Luder drops many copies of itself in various locations, and then adds a small codepiece to innocent applications in such a way that when such infected files are run, the main virus is executed as well.   NOTE: The variables %SITE% and %SYSTEM% refers to specific web sites used, and the Windows System folder, respectively.

URL: http://www.norman.com/Virus/Virus_descriptions/42490

Siemens Networks Selects Infoblox as Its Preferred DNS Partner

Siemens Networks Selects Infoblox as Its Preferred DNS Partner

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), and Siemens Networks (NYSE: SI), today announced that Siemens has standardized on Infoblox appliances to provide mobile and fixed network operators DNS services.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/NIozk5l1rw4/release.cfm

World’s Leading Beverage Can Maker Standardizes on Infoblox Appliances

Worlds Leading Beverage Can Maker Standardizes on Infoblox Appliances

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced that Rexam, one of the world’s leading consumer packaging groups and the leading beverage can maker, has selected and deployed Infoblox appliances.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/V3X1WRlDjUg/release.cfm