=-=-=-=-=-=-= Original message BEGINs here: =-=-=-=-=-=-=   
      
   Subject: ?US-ASCII?Q?TA15-098A:_AAEH?   
   From: ?US-ASCII?Q?US-CERT?    
      
      
      
   National Cyber Awareness System:   
      
   TA15-098A: AAEH [ https://www.us-cert.gov/ncas/alerts/TA15-098A ] 04/09/2   
   015 12:00 AM EDT   
   Original release date: April 09, 2015   
      
   Systems Affected   
      
    * Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8   
    * Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012   
      
      
   Overview   
      
   AAEH is a family of polymorphic downloaders created with the primary purp   
   ose of downloading other malware, including password stealers, rootkits,   
   fake antivirus, and ransomware.   
      
   The United States Department of Homeland Security (DHS), in collaboration   
    with Europol, the Federal Bureau of Investigation (FBI) and the Departme   
   nt of Justice (DOJ), released this Technical Alert to provide further inf   
   ormation about the AAEH botnet, along with prevention and mitigation reco   
   mmendations.   
      
   Description   
      
   AAEH is often propagated across networks, removable drives (USB/CD/DVD),   
   and through ZIP and RAR archive files. Also known as VObfus, VBObfus, Bee   
   bone or Changeup, the polymorphic malware has the ability to change its f   
   orm with every infection. AAEH is a polymorphic downloader with more than   
    2 million unique samples. Once installed, it morphs every few hours and   
   rapidly spreads across the network. AAEH has been used to download oth   
   er malware families, such as Zeus, Cryptolocker, ZeroAccess, and Cutwail.   
      
      
   Impact   
      
   A system infected with AAEH may be employed to distribute malicious softw   
   are, harvest users' credentials for online services, including banking se   
   rvices, and extort money from users by encrypting key files and then dema   
   nding payment in order to return the files to a readable state. AAEH is c   
   apable of defeating anti-virus products by blocking connections to IP add   
   resses associated with Internet security companies and by preventing anti   
   -virus tools from running on infected machines.   
      
   Solution   
      
   Users are recommended to take the following actions to remediate AAEH inf   
   ections:   
      
      
    * "Use and maintain anti-virus software" - Anti-virus software recogniz   
   es and protects your computer against most known viruses. It is important   
    to keep your anti-virus software up-to-date (see Understanding Anti-Viru   
   s Software for more information [ http://www.us-cert.gov/ncas/tips/ST04-0   
   05 ]).   
    * "Change your passwords" - Your original passwords may have been compr   
   omised during the infection, so you should change them (see Choosing and   
   Protecting Passwords for more information [ http://www.us-cert.gov/ncas/t   
   ips/ST04-002 ]).   
    * "Keep your operating system and application software up-to-date" - In   
   stall software patches so that attackers can't take advantage of known pr   
   oblems or vulnerabilities. Many operating systems offer automatic updates   
   . If this option is available, you should enable it (see Understanding Pa   
   tches for more information [ http://www.us-cert.gov/ncas/tips/ST04-006 ])   
   .   
    * "Use anti-malware tools" - Using a legitimate program that identifies   
    and removes malware can help eliminate an infection.   
      
   Users can consider employing a remediation tool (examples below) that wil   
   l help with the removal of AAEH from your system.   
      
   Note: AAEH blocks AV domain names thereby preventing infected users from   
   being able to download remediation tools directly from an AV company. The   
    links below will take you to the tools at the respective AV sites. In th   
   e event that the tools cannot be accessed or downloaded from the vendor s   
   ite, the tools are accessible from Shadowserver (http://aaeh.shadowserver   
   .org).   
      
   The below are examples only and do not constitute an exhaustive list. The   
    U.S. Government does not endorse or support any particular product or ve   
   ndor.   
      
   References   
      
    * F-Secure Online Scanner for Windows Vista, 7 and 8 [ http://www.f-sec   
   ure.com/en/web/home_global/online-scanner ]   
    * F-Secure Removal Tools for Windows XP [ http://www.f-secure.com/en/we   
   b/labs_global/removal-tools/-/carousel/view/142 ]   
    * McAfee Stinger for Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7 and 8   
    [ http://www.mcafee.com/stinger ]   
    * Microsoft Safety Scanner for Windows 8.1, Windows 8, Windows 7, Windo   
   ws Vista, and Windows XP [ http://www.microsoft.com/security/scanner/en-u   
   s/default.aspx ]   
    * Sophos Virus Removal for Windows XP SP2 and above [ http://www.sophos   
   .com/VirusRemoval ]   
    * Trend Micro Threat Detector for Windows XP, Windows Vista, Windows 7,   
    Windows 8/8.1, Windows Server 2003/2008, and 2008 R2 [ http://www.trendm   
   icro.com/threatdetector ]   
      
   Revision History   
      
    * April 9, 2015: Initial Release   
   ________________________________________________________________________   
      
   This email was sent to certecho@net396.fidonet.org using GovDelivery, onbehalf   
   of: United States Computer Emergency Readiness Team (US-CERT) B7245 Murray   
   Lane SW Bldg 410 B7 Washington, DC 20598 B7 (888) 282-0870   
    Powered by GovDelivery [ http://www.govdelivery.com/portals/powered-by ]   
      
      
      
   -+-   
    + Origin: FidoNet<>Internet Gateway -Huntsville AL- USA- (1:396/3)   
      
    =-=-=-=-=-=-=-= .END of Forwarded message =-=-=-=-=-=-=-=   
      
   --   
   Guardien Fide :^)   
      
    Ben aka cMech Web: http://cmech.dynip.com   
    Email: fido4cmech(at)lusfiber.net   
    Home page: http://cmech.dynip.com/homepage/   
    WildCat! Board 24/7 +1-337-984-4794 any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   
|