Symantec Unmasks Trojan Hiding on Legit Google Docs Function
By Erik Pineda | November 20, 2012 12:30 PM EST
Anti-virus specialist Symantec has unmasked a new malware that exploits a function of Google Docs to secretly communicate with its command and control (C&C) server, likely infecting even new machines running on Windows 8 and Windows Server 2012.
In a blog post published Friday last week, Symantec researcher Takashi Katsuki identified the Trojan as a new variation of malware belonging to the Backdoor.Makadocs family, which "uses the Google Drive Viewer feature as a proxy for receiving instructions from the real C&C," according to IDG News.
"In violation of Google's policies, Backdoor.Makadocs uses this function to access its C&C server," Mr Katsuki warned.
The malware, he added, is fully capable of siphoning off information from targeted machines and can be used by its 'handler' to remotely dispatch instructions and commands.
It appears that the malware author is taking advantage of the secured connection affiliated with Google Docs, a Google service that is now included with its cloud division Google Drive, to cloak its malicious traffic, Mr Katsuki further explained.
Backdoor.Makadocs is also believed to be recently unleashed since it can operate within the relatively new environment of Microsoft's operating system, prompting suggestions from Symantec researchers that the malware was recently revised for the new OS and server from the tech giant.
Citing data provided by Symantec, SCMagazine reported on Monday that around 100 infections attributed to Backdoor.Makadocs have been reported in Brazil, pointing to the likelihood that the revised malware is currently on testing stage.
Nonetheless, users are warned not to open rich text format (RTF) and document (DOC) files they received from unknown or unverified sources.
They normally are sent via phishing emails, Mr Katsuki said, and they attempt "to pique the user's interest with the title and content of the document and trick them into clicking on it and executing it."
Google has been made aware of the issue, Symantec said, adding that the tech giant could easily block the malware's intrusive functions by reconfiguring its firewall.
In a statement, Google said it is currently monitoring the problem and ready to implement appropriate actions.
"Using any Google product to conduct this kind of activity is a violation of our product policies ... We investigate and take action when we become aware of abuse," the internet giant's statement was quoted by SCMagazine as saying.
To contact the editor, e-mail:
Most Popular Slideshows
- From Fat To Fit: Celebrities Who Were Overweight Before They Became The Beauties That They Are
- Kendall Jenner Could Be Next Victoria's Secret Angel [PHOTOS]
- Taylor Swift Named People's Best Dressed Stars Of 2014 [PHOTOS]
- Champions League Results: Barcelona Barely Escapes With A Win, Chelsea Fails To Hold On To The Lead [PHOTOS]
Join the Conversation
- iPhone 6 Release Down Under – Meet The First People To Have The Newest iPhones
- Masayoshi Son Is Japan’s Richest Man As Softbank Shares Surge Ahead Of Alibaba IPO; More Millionaires Among Alibaba Employees On The Way
- Ex-Male Strippers For Rent At $125/Hour To Act As ManServants
- Alibaba Hikes IPO Price Range To $66-$68 From $60-$66
- Google Nexus 6 Release Date on Q4 2014 Confirmed by T-Mobile Featuring Wi-Fi Calling
- Samsung Galaxy Note 4 vs. BlackBerry Passport — Specifications, Features, Release Date And Price Showdown
- 3 Signs Apple iPhone 6 Could be in Short Supply Following its Sept 19 Release Date
- Australia Actively Rallying Support For International Coalition Against ISIS
- iOS 8 Jailbreak Release Update: Pangu Devs Will Outrace Evad3rs in Rollout of iPhone 6, iPad Unlocker
- Micromax Canvas A1 Vs Spice Dream Uno Vs Karbonn Sparkle V: A Choice On Which Android Is The Best
- Australian Liberals Urge Expat Kiwis To Favour John Key In New Zealand Election