{"id":18529,"date":"2012-08-02T21:24:10","date_gmt":"2012-08-03T01:24:10","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-09-02T15:07:00","modified_gmt":"2022-09-02T19:07:00","slug":"trojan-launches-massive-print-jobs","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/trojan-launches-massive-print-jobs\/","title":{"rendered":"Malware Launches Massive Print Jobs"},"content":{"rendered":"<p><a href=\"http:\/\/etc.usf.edu\/clipart\/44800\/44880\/44880_guten_press.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-108381\" title=\"Malware Launches Massive Print Jobs\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/print_press_guten.gif?resize=111%2C110&#038;ssl=1\" alt=\"Malware Launches Massive Print Jobs\" width=\"111\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/print_press_guten.gif?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/print_press_guten.gif?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 111px) 100vw, 111px\" \/><\/a>If your <a title=\"Printers\" href=\"https:\/\/web.archive.org\/web\/20150505192608\/http:\/\/www.business.com\/technology\/all-in-ones\/\" target=\"_blank\" rel=\"noopener noreferrer\">printers<\/a> start printing garbage characters until they run out of paper, it&#8217;s a sure sign your network has been hit by the Milicenso Trojan malware. <em>Help Net Security<\/em> <a title=\"Trojan infection triggers massive printing jobs\" href=\"http:\/\/web.archive.org\/web\/20120625220832\/http:\/\/www.net-security.org:80\/malware_news.php?id=2156\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that\u00a0<a title=\"Symantec\" href=\"https:\/\/securitycloud.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Symantec<\/a> (<a title=\"NASDAQ : SYMC\" href=\"https:\/\/wp.me\/p2wgaW-pra\" target=\"_blank\" rel=\"noopener noreferrer\">SYMC<\/a>) researchers have <a title=\"Malware is causing network printers to print random ASCII characters\" href=\"http:\/\/www.symantec.com\/business\/support\/index?page=content&amp;id=TECH190982\" target=\"_blank\" rel=\"noopener noreferrer\">found<\/a> that the garbled printouts are just a side effect of the infection and not its goal. The malware&#8217;s last variants have an <a title=\"VirusTotal\" href=\"https:\/\/www.virustotal.com\/file\/90910a49226f6488de42d27ac1b347c68a0d5a9c1b070bf5dfdaea8ac368cfc9\/analysis\/1340227448\/\" target=\"_blank\" rel=\"noopener noreferrer\">extremely low detection rate<\/a> &#8211; only 4 of the 42 solutions used by <a title=\"VirsuTotal\" href=\"https:\/\/www.virustotal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Virus Total<\/a> detect them at the moment.<\/p>\n<p><a href=\"http:\/\/www.conspiracycafe.net\/latte\/index.php?\/topic\/22857-serialized-novel-by-judge-bean\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108384\" title=\"Trojan horse malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Stunt_Horse.jpg?resize=140%2C110&#038;ssl=1\" alt=\"Trojan horse malware\" width=\"140\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Stunt_Horse.jpg?resize=150%2C118&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Stunt_Horse.jpg?resize=75%2C59&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Stunt_Horse.jpg?w=640&amp;ssl=1 640w\" sizes=\"auto, (max-width: 140px) 100vw, 140px\" \/><\/a>The article says the <a title=\"Milicenso Trojan\" href=\"https:\/\/web.archive.org\/web\/20151030030922\/https:\/\/www.symantec.com\/security_response\/\/writeup.jsp?docid=2012-071606-1110-99\" target=\"_blank\" rel=\"noopener noreferrer\">Milicenso Trojan<\/a> is actually a <a title=\"Hidden Backdoors, Trojan Horses and Rootkit Tools in a Windows Environment\" href=\"https:\/\/web.archive.org\/web\/20130117025425\/http:\/\/windowsecurity.com\/articles\/Hidden_Backdoors_Trojan_Horses_and_Rootkit_Tools_in_a_Windows_Environment.html\" target=\"_blank\" rel=\"noopener noreferrer\">backdoor<\/a> used to deliver other malware on the affected machines. The infection vectors are links and malicious attachments in unsolicited emails, as well as websites hosting malicious scripts that trigger the download of the <a title=\"Defining Malware: FAQ \" href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dd632948.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan<\/a>. &#8220;The Trojan creates and executes a dropper executable, which in turn creates a <a title=\"Dynamic-link library\" href=\"http:\/\/en.wikipedia.org\/wiki\/Dynamic-link_library\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">DLL file<\/a> in the %System% folder&#8221;, shared the Symantec researchers.<\/p>\n<p>The heavily encrypted DLL file creates a number of EXE and DLL files and uses a number of routines to discover whether the execution environment is a virtual machine, public malware sandbox or a black-boxing site. The Trojan also drops a piece of adware, whose aim is to serve as a decoy for AV solutions present on the machines. The blog says the\u00a0 <a title=\"Adware.Eorez\" href=\"http:\/\/www.microsoft.com\/security\/portal\/Threat\/Encyclopedia\/Entry.aspx?Name=Adware%3AWin32%2FEoRezo\" target=\"_blank\" rel=\"noopener noreferrer\">Adware.Eorezo<\/a> has only one goal: to point <a title=\"Internet Explorer\" href=\"https:\/\/web.archive.org\/web\/20131209032041\/http:\/\/web-browsers.findthebest.com\/l\/4\/Internet-Explorer\" target=\"_blank\" rel=\"fdbsoftware noopener noreferrer\">Internet Explorer<\/a> to an ad-relater URL.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108387\" title=\"Sandbox environment\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sandbox_enviroment.jpg?resize=133%2C100&#038;ssl=1\" alt=\"Sandbox environment\" width=\"133\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sandbox_enviroment.jpg?resize=150%2C112&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sandbox_enviroment.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sandbox_enviroment.jpg?w=550&amp;ssl=1 550w\" sizes=\"auto, (max-width: 133px) 100vw, 133px\" \/><em>Help Net Security<\/em> explains the malware triggers the massive printing by exploiting the Windows default print spooler directory. &#8220;During the infection phase, a .spl file is created in [DRIVE_LETTER]system32Spool PRINTERS[RANDOM].spl. Note the Windows\u2019 default print spooler directory is %System%spoolprinters.&#8221;<\/p>\n<p>The researchers explained &#8220;The .spl file, while appearing to be a common printer spool file, is actually an executable file and is detected as Adware.Eorezo. Depending on the configuration, any files, including binary files, created in that folder will trigger print jobs.&#8221;<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I have written about the risks of copiers and printers <a title=\"Copiers Get Politicized\" href=\"https:\/\/wp.me\/p2wgaW-JF\" target=\"_blank\" rel=\"noopener\">here<\/a> <a title=\"Copier Security Best Practices\" href=\"https:\/\/wp.me\/p2wgaW-Km\" target=\"_blank\" rel=\"noopener\">and<\/a> <a title=\"Blackhole Crimeware\" href=\"https:\/\/wp.me\/p2wgaW-2OF\" target=\"_blank\" rel=\"noopener\">here<\/a>. I&#8217;m sure someone will figure out how to use this malware as a direct DOS on printers, and not as a side effect.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Symantec says a mountain of garbled printouts are the side effect of the of Milicenso Trojan a backdoor used to deliver other malware on the affected PC&#8217;s<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,23,82,421,75,4,165,445],"class_list":["post-18529","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-malware","tag-microsoft","tag-msft","tag-printer","tag-security","tag-symantec","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/18529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=18529"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/18529\/revisions"}],"predecessor-version":[{"id":129669,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/18529\/revisions\/129669"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=18529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=18529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=18529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}