To hack or not to hack MSN accounts

June 2010 Information Security

A mass mail invitation to a suspicious 'do-it-yourself' account hacking session puts Windows Live Messenger users at risk.

The e-mail marking the first step of this data harvesting scheme is very likely to go down in the history of cybercrime-generated fiction on human behavior - claiming that if you tell people something is illegal, they will not do it. This is how the promised tool gets the thinnest of all legitimacy coatings: “This tool could be used by hackers to hack MSN password, it should not because Windows Live password hacking is illegal! […]”.

Much like a wolf trying really hard to grow a thick coat of wool and develop a persuasive bleating technique, this tool is allegedly intended for '[…] the use of owners to hack their own MSN accounts […]' and for 'forensic scientists'.

Far be it from me the idea of preaching complete distrust in our fellow humans and their natural generosity! However, the logic of this message is quite puzzling. The final reference to the tool being valid for situations in which you are '[…] able to login without having to enter your password' adds to its sci-fi aura.

Such in-depth analysis of the meaning of every e-mail that you receive may not be your favorite pass time, but any claim to rendering password recover easier is quite hilarious in an age when you can never be too cautious about personal data theft.

Literary analysis aside, the promised tool is supposed to be downloaded using the link embedded in the message. And here is when HackMsn.exe drops its mask and reveals that it is a backdoor at heart.

Identified by BitDefender as Backdoor.Bifrose.AADY, this piece of malicious code affects Windows platforms. The malware injects itself into the explorer.exe process and opens up a backdoor that allows unauthorised access to and control over the affected system.

Moreover, Backdoor.Bifrose.AADY attempts to read the keys and serial numbers of the various pieces of software installed on the affected computer, while also logging the passwords to the victim’s ICQ, Messenger, POP3 mail accounts, and protected storage.

This is not the first campaign aiming to disseminate this piece of malware. You can find out the details of another scheme it has been part of on the Malwarecity Blog

For more information contact Alina ANTON, senior PR and Marketing Coordinator, EMEA & APAC Business Unit, BitDefender, +40 212 063 470, [email protected], www.bitdefender.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Kaspersky finds 24 vulnerabilities in biometric access systems
Technews Publishing Information Security
Customers urged to update firmware. Kaspersky has identified numerous flaws in the hybrid biometric terminal produced by international manufacturer ZKTeco, allowing a nefarious actor to bypass the verification process and gain unauthorised access.

Read more...
Responsible AI boosts software security
Information Security
While the prevalence of high-severity security flaws in applications has dropped slightly in recent years, the risks posed by software vulnerabilities remain high, and remediating these vulnerabilities could hinder new application development.

Read more...
AI and ransomware: cutting through the hype
AI & Data Analytics Information Security
It might be the great paradox of 2024: artificial intelligence (AI). Everyone is bored of hearing it, but we cannot stop talking about it. It is not going away, so we had better get used to it.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...
Surveillance and cybersecurity
Cathexis Technologies Information Security
Whether your business runs a security system with a handful of cameras or it is an enterprise company with thousands of cameras monitoring sites across a multinational organisation, you must pay attention to cybersecurity.

Read more...
Cyber-armour for a healthcare industry under attack
NEC XON Information Security Healthcare (Industry)
Malicious actors have exploited compromised credentials, a clear and present danger when healthcare providers' reliance on remote access software allows adversaries to disguise themselves as legitimate users and gain unauthorised access to critical environments.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...