Home Malware Programs Backdoors Gresim

Gresim

Posted: November 6, 2014

Threat Metric

Ranking: 8,090
Threat Level: 8/10
Infected PCs: 4,806
First Seen: November 6, 2014
Last Seen: October 9, 2023
OS(es) Affected: Windows

Gresim is a Windows-based backdoor Trojan used in attacks granting third parties remote access to an infected computer. Gresim may be involved in targeted attacks against business, government and non-profit institutions rivaling or opposing the Chinese government. However, this Trojan includes attack capabilities that put any infected PC at risk of losing confidential information and related issues. Because Gresim includes some defenses against outdated detection techniques, any anti-malware products used for removing Gresim should have their databases patched to include the latest entries for this Trojan.

A New Backdoor with an Old Plan of Attack

Gresim is one of the latest families of backdoor Trojans and RATs to associate with Axiom, a collection of hackers that have targeted defense contractors, 'free Tibet' sympathizers and Google, among others. The Gresim family (also known as Zox, not to be confused with a much older DOS virus by the same name) was confirmed in 2014. However, Axiom has had extensive campaigns going back for years, with each campaign using specialized Trojans to deliver to carefully-selected targets. Distribution models for Gresim Trojans are expected to include hacked websites forced to host threatening scripts, along with e-mail attachments. Most Axiom attacks using the latter method disguise the attachments with the formats of Microsoft Office documents, with subject matter pertaining to the victim's interests or job.

Gresim's successful infiltration lets third parties control your PC from a C&C server. Through that server, third parties may install new threats besides Gresim, modify files or system settings, record your webcam, take screen captures, record your keyboard input or close unwanted applications automatically. Malware experts warn that Gresim also may be instructed to make additional attacks that depend on the information issued from its server, which may include command-line instructions to your PC.

Keeping Well-Used Vulnerabilities Away from Your PC

Gresim may be a fairly new Trojan, but its distribution methods are years old, and include techniques that good anti-malware products should be able to block. Automated browser security should protect your PC from downloads accomplished through hacked websites, and e-mail attachments always can be scanned to detect a Gresim installer or associated threat. In addition, malware researchers also encourage patching all vulnerable software, which can much-reduce the presence of threat-installing exploits. In this respect, Adobe and Microsoft applications are two of the most often-abused brands.

Gresim's attacks are asymptomatic and effectively undetectable by casual observation, but also give third parties almost total access to an infected computer. Windows users can use regular, scheduled anti-malware scans for removing Gresim. Post-removal, all PC users also should account for the possibility of Gresim having transferred information, such as passwords or sensitive documents, from the infected machine into the hands of Axiom or other third parties.

Loading...