A new variant of the PushDo malware has already been distributed to tens of thousands of computers across the globe, researchers from Bitdefender reported.
After analyzing the threat, the security firm determined that its authors have made some significant changes compared to earlier PushDo variants. For example, while the communication protocol remains the same, the public and private keys used to encrypt the traffic between bots and the command and control (C&C) server have been changed.
“Another significant change was made at the binary level. New PushDo binaries contain now an encrypted overlay, having the role of a checkup. If the conditions specified in the overlay aren’t met, the sample doesn’t run properly. Also, now the list containing approximately 100 clean domain names, which hide the hard-coded domain name of the C&C can be found here and not in the binary file,” Bitdefender researchers wrote in a blog post.
PushDo resurfaced in May 2013, when security companies noted that its authors had adopted RSA encryption to protect botnet traffic, and added a domain name generation algorithm (DGA) that was capable of generating over 1,300 unique domains names in a single day.
Now, according to Bitdefender, the main structure of the DGA remains mostly the same, but the domain names that are generated are very different. The new DGA, which currently generates 30 domain names per day, kicks in to re-establish connectivity if none of the hardcoded domains point to a valid C&C server.
The new variant emerged on July 14 and the security firm almost immediately sinkholed some of the domains used by the malware. Bogdan Botezatu, Senior E-threat Analyst at Bitdefender, told SecurityWeek that the new variant is distributed as an update to victims that are already infected with the older version of PushDo. The company’s sinkholing efforts revealed that the threat has already been distributed to 42,501 unique IPs in less than 48 hours.
Data provided by Bitdefender to SecurityWeek shows that the most infections have been spotted in India (4,215), Vietnam (3,637), the United States (2,153), Argentina (2,075), Turkey (2,045), Mexico (1,811), Indonesia (1,755), Iran (1,561), Italy (1,393) and Thailand (1,107). Hundreds of infections have been detected in Egypt, Taiwan, the Philippines, Peru, Brazil, France, Russia, Malaysia, Poland, South Africa, Pakistan, Colombia, South Korea, China, Spain, Japan, Germany and the UK.
“The new PushDo variant is only deploying the Cutwail spam component to users but we expect that, once the update process is complete, to see PushDo re-start downloading its usual components (the Cutwail spammer, DDoS Trojans and password stealers),” Botezatu said.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
Latest News
- What if the Current AI Hype Is a Dead End?
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
