IE Defender/Files Secure/MalwareBell/IE Antivirus Codec has been update, it installs files with semi-random filenames, composed from fragment words: x, c, s, edif, osys, ecol, ns, pd, gd, a, o, y
Files could look like: cosysnsy.dll, xecolgda.dll ...
VideoAccessCodec has been update, it installs the following files:
%WINDOWS%\ksendlbt???.dll (where ? is a random caracter) %WINDOWS%\vrmdtneg.dll %WINDOWS%\xvorfwbd.dll %WINDOWS%\wpvmqosg.dll %WINDOWS%\neltabxw.exe %WINDOWS%\e???.exe (where ? is a random caracter)
Zlob infections are related to p0rn sites ! This used to be true but it is not anymore. After Fake Codec Errors , Fake Flash Errors, Fake Flash Version, Faked MP3 Download. Zlob infections familly (Rogue installer Antispycheck/IEAntivirus, DNS Changer, VAC) is also spread on Fake Cracks/Warez Blogs or Fake Softwares Downloads WebSites.
Notice the "*100% checked by Antivirus" comment ;)
IE Defender/Files Secure/MalwareBell/IE Antivirus Codec has been update, it installs files with semi-random filenames, composed from fragment words: t, p, b, a, o, u, pdf, sdg, pls, an, o, im
Files could look like: paplsan.dll, pasdgo.dll, tasdgo.dll ...
A new version of DNSChanger trojan has been discovered. This time, the malware doesn't only affect the system DNS settings. It targets the router itself.
From a list of different routers URLs and a dictionary of default passwords, the malware brute force the web interface and hijacks DNS settings.
List of URL from various routers
Dictionary of default login:passwords
DNSChanger IP address in Ukraine
If the attack succeeds, all computers in the network using the router DNS settings are affected. The hijacked devise can redirects connections to a fake website.
IE Defender/Files Secure/MalwareBell/IE Antivirus Codec has been update, it installs files with semi-random filenames, composed from fragment words: t, p, b, a, o, u, sant, post, sect, 32, 16a, 8x
Files could look like: tosant32.dll, pasant32.dll ...
VideoAccessCodec has been update, it installs the following files:
%WINDOWS%\nogxfvbl???.dll (where ? is a random caracter) %WINDOWS%\nmwegbsf.dll %WINDOWS%\adgpfoxs.dll %WINDOWS%\erpobmsw.dll %WINDOWS%\xbqmfsed.exe %WINDOWS%\e???.exe (where ? is a random caracter)