New Financial Virus Targets Iran

Now this is interesting. From Symantec, makers of the Norton Ant-Virus family of products:

n the last couple of years, we have seen highly sophisticated malware used to sabotage the business activities of chosen targets. We have seen malware such as W32.Stuxnet designed to tamper with industrial automation systems and other destructive examples such as W32.Disstrack and W32.Flamer, which can both wiped out data and files from hard disks. All of these threats can badly disrupt the activities of those affected.

Following along that theme, we recently came across an interesting threat that has another method of causing chaos, this time, by targeting and modifying corporate databases. We detect this threat as W32.Narilam.

Based on the detections observed, W32.Narilam is active predominantly in the Middle East. (See heat map above)

Just like many other worms that we have seen in the past, the threat copies itself to the infected machine, adds registry keys, and spreads through removable drives and network shares. It is even written using Delphi, which is a language that is used to create a lot of other malware threats. All these aspects of this threat are normal enough, what is unusual about this threat is the fact that it has the functionality to update a Microsoft SQL database if it is accessible by OLEDB. The worm specifically targets SQL databases with three distinct names: alim, maliran, and shahd.

The malware does not have any functionality to steal information from the infected system and appears to be programmed specifically to damage the data held within the targeted database. Given the types of objects that the threat searches for, the targeted databases seem to be related to ordering, accounting, or customer management systems belonging to corporations.

The problem is that the U.S. is not invulnerable from this type of worm either, though this worm specifically attacks Persian names and tables.

Via Gizmodo

Shortlink:

Posted by on November 26, 2012.
Filed under Iran.
Doug Johnson is a news junkie and long time blog reader, turned author.

You can leave a response or trackback to this entry
  • Commander_Chico

    Pandora’s box?

    Wait until Chinese programmers turn their attention to US systems.

    • retired.military

      What do you mean “wait until”

      • Commander_Chico

        I mean full-court press, not a little testing.

  • ackwired

    I guess it’s a better way to fight a war than killing people.