Symantec says they have discovered a new variant of the TDL (Tidserv) family of malware that downloads the full legitimate Chromium Embedded Framework (CEF) as part of its normal operation.
While malware using legit development platforms isn’t unheard of, Symantec notes, the fact that the latest incarnation of TDL downloads the entire 50MB CEF core is a bit odd.
CEF is a framework for embedding controls in desktop applications, or add additional functionality to a given app. It’s useful for adding HTML 5 GUIs to desktop applications, and it’s handy for developers as it can be used with C, C++, Java, .NET, and Python – on Windows, Linux, or OS X.
The wide range of platform and code adoption within CEF is likely why the authors are using it for TDL, as the moneymaking rootkit could gain traction if it were to branch out from Windows to other operating systems. However, while the malware’s latest module-driven design has some unique code, the malware is useless unless the compromised host downloads the full framework – all 50MB of it.
“While this may not be the first time a malware has made use of a legitimate framework for nefarious purposes, this new [TDL] variant requires the download of the 50 MB framework to function correctly, which is an unusual thing for a threat to do,” Symantec said in a blog post.
While Symantec can’t say for certain if the spike in downloads for CEF is directly related to the latest TDL variant, they’re certain that some of them are malicious in nature. As of last Friday, there were more than 20,000 CEF downloads.
TDL is only using one aspect of the framework for its modular functions, and in order to prevent their code form being maliciously abused, the CEF project members have removed the needed library from access and are exploring alternative options of delivering cef.dll, which may include altering the serf332 module itself.
For the history of TDL, Symantec has a running tab on the malware family posted online for those who are curious.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
