Symantec Unmasks Trojan Hiding on Legit Google Docs Function
By Erik Pineda | November 20, 2012 12:30 PM EST
Anti-virus specialist Symantec has unmasked a new malware that exploits a function of Google Docs to secretly communicate with its command and control (C&C) server, likely infecting even new machines running on Windows 8 and Windows Server 2012.
In a blog post published Friday last week, Symantec researcher Takashi Katsuki identified the Trojan as a new variation of malware belonging to the Backdoor.Makadocs family, which "uses the Google Drive Viewer feature as a proxy for receiving instructions from the real C&C," according to IDG News.
"In violation of Google's policies, Backdoor.Makadocs uses this function to access its C&C server," Mr Katsuki warned.
The malware, he added, is fully capable of siphoning off information from targeted machines and can be used by its 'handler' to remotely dispatch instructions and commands.
It appears that the malware author is taking advantage of the secured connection affiliated with Google Docs, a Google service that is now included with its cloud division Google Drive, to cloak its malicious traffic, Mr Katsuki further explained.
Backdoor.Makadocs is also believed to be recently unleashed since it can operate within the relatively new environment of Microsoft's operating system, prompting suggestions from Symantec researchers that the malware was recently revised for the new OS and server from the tech giant.
Citing data provided by Symantec, SCMagazine reported on Monday that around 100 infections attributed to Backdoor.Makadocs have been reported in Brazil, pointing to the likelihood that the revised malware is currently on testing stage.
Nonetheless, users are warned not to open rich text format (RTF) and document (DOC) files they received from unknown or unverified sources.
They normally are sent via phishing emails, Mr Katsuki said, and they attempt "to pique the user's interest with the title and content of the document and trick them into clicking on it and executing it."
Google has been made aware of the issue, Symantec said, adding that the tech giant could easily block the malware's intrusive functions by reconfiguring its firewall.
In a statement, Google said it is currently monitoring the problem and ready to implement appropriate actions.
"Using any Google product to conduct this kind of activity is a violation of our product policies ... We investigate and take action when we become aware of abuse," the internet giant's statement was quoted by SCMagazine as saying.
To contact the editor, e-mail:
Most Popular Slideshows
- George Clooney And Amal Alamuddin's Wedding In Venice: Photos Of Groom And His Family, Friends [Slideshow]
- NFL Recap - Week 4: Green Bay Packers 38, Chicago Bears 17 [PHOTOS]
- Walking Is Superfood For Fitness; Celebrities Who Walk For Health
- Derek Jeter With The New York Yankees Through The Years [IN PICTURES]
Join the Conversation
- Hong Kong Protests Cause Closure Of Banks & Instagram Outages In China
- Federal Court Orders Coles To Hang Signs For 3 Months That It Passed Off Par-Baked Bread As Fresh From The Oven
- Microsoft To Have Its Own Retail Outlet in Manhattan
- Telstra To Convert Old Payphones Into Wi-Fi Hotspots
- #Bendgate Video Hits Almost 46 Million In 5 Days, But Impact On Apple’s Finances Minimal
- 3 Reasons to Get the Samsung Galaxy Note 4 Instead of the iPhone 6
- iPhone 6 vs Moto G 2014: Motorola’s Budget Smartphone Takes On Apple’s Premium Smartphone
- Google HTC Nexus 9 Tablet October 24 Launch Date Benefits Many
- Galaxy Note 4 vs Nexus 6: Which Smartphone Dominates
- MH 370 Search In Ocean To Intensify With Hi Tech Ships Joining The Plane Hunt From October
- Nexus 7 Tips and Tricks
- Obama’s Bid To Blame Intelligence Chief For Inaction On ISIS Backfires: McCain Asks Obama To Admit Own Mistakes