Symantec Unmasks Trojan Hiding on Legit Google Docs Function
By Erik Pineda | November 20, 2012 12:30 PM EST
Anti-virus specialist Symantec has unmasked a new malware that exploits a function of Google Docs to secretly communicate with its command and control (C&C) server, likely infecting even new machines running on Windows 8 and Windows Server 2012.
In a blog post published Friday last week, Symantec researcher Takashi Katsuki identified the Trojan as a new variation of malware belonging to the Backdoor.Makadocs family, which "uses the Google Drive Viewer feature as a proxy for receiving instructions from the real C&C," according to IDG News.
"In violation of Google's policies, Backdoor.Makadocs uses this function to access its C&C server," Mr Katsuki warned.
The malware, he added, is fully capable of siphoning off information from targeted machines and can be used by its 'handler' to remotely dispatch instructions and commands.
It appears that the malware author is taking advantage of the secured connection affiliated with Google Docs, a Google service that is now included with its cloud division Google Drive, to cloak its malicious traffic, Mr Katsuki further explained.
Backdoor.Makadocs is also believed to be recently unleashed since it can operate within the relatively new environment of Microsoft's operating system, prompting suggestions from Symantec researchers that the malware was recently revised for the new OS and server from the tech giant.
Citing data provided by Symantec, SCMagazine reported on Monday that around 100 infections attributed to Backdoor.Makadocs have been reported in Brazil, pointing to the likelihood that the revised malware is currently on testing stage.
Nonetheless, users are warned not to open rich text format (RTF) and document (DOC) files they received from unknown or unverified sources.
They normally are sent via phishing emails, Mr Katsuki said, and they attempt "to pique the user's interest with the title and content of the document and trick them into clicking on it and executing it."
Google has been made aware of the issue, Symantec said, adding that the tech giant could easily block the malware's intrusive functions by reconfiguring its firewall.
In a statement, Google said it is currently monitoring the problem and ready to implement appropriate actions.
"Using any Google product to conduct this kind of activity is a violation of our product policies ... We investigate and take action when we become aware of abuse," the internet giant's statement was quoted by SCMagazine as saying.
To contact the editor, e-mail:
Most Popular Slideshows
- NFL MNF: Washington Redskins 20, Dallas Cowboys 17 (OT) [PHOTOS]
- Emma Watson Gets 'Squished' In 'Colonia Dignidad' [PHOTOS]
- 2014 MLB World Series Game 6: Kansas City Royals 10, San Francisco Giants 0 [PHOTOS]
- San Francisco Giants Beat Kansas City Royals, 3-2 In Game 7, Wins 2014 MLB World Series [PHOTOS]
Join the Conversation
- Marvel Announces Release Dates Of 11 Upcoming Movies From 2015 To 2019
- Xiaomi Becomes World’s Third Largest Smartphone Manufacturer By Dethroning Huawei
- Nokia Lumia 730 v. Sharp Aquos Crystal – Specifications, Features And Price Showdown
- Entry Of Peshmerga Fighters From Iraq Boosts The Kobani Battle Against ISIS: Turkey Provides Transit
- Nexus 6, 9 Buyers on November Release Will Enjoy These 3 Killer Lollipop 5.0 Features First
- Australia Special Forces Await 'Delayed' Iraqi Visas Before Joining ISIS Fight
- Woman Hanged In Iran Talks Abuse In Prison, Left Chilling Message To Family