Home Malware Programs Trojans Magala

Magala

Posted: July 14, 2017

Threat Metric

Threat Level: 9/10
Infected PCs: 70
First Seen: July 14, 2017
Last Seen: January 20, 2022
OS(es) Affected: Windows

Magala is a 'clicker' Trojan that generates false advertising traffic without affecting the PC user's Web-browsing experience necessarily. The Trojan's attacks show limited symptoms beyond some changes to Internet Explorer's behavior through the Registry, such as hijacking its homepage. Despite not aiming its payload at the user, you should treat this program as threatening and use anti-malware programs for uninstalling Magala or preventing its installation.

The Natural Evolution of Adware Continues Apace

Although generating revenue is at the forefront of almost every modern threat campaign, different threat actors use a variety of ways to make that money. Some of these methods can harm the infected system's user directly, such as by encrypting their files. With others, the user may not even be a part of the payload's routines, except as something to circumvent, a la Trojan Magala.

While Magala has been in distribution for a long time, a comprehensive response and analyses from the security industry began three months into 2017. Malware researchers are estimating that most Magala infections are spreading through freely-downloaded bundles, such as installers for system cleaners or torrent-based content. Magala, like most Trojans, is Windows-specific and, in fact, requires a modern version of Internet Explorer to run.

Magala fails to execute its payload on any system using Internet Explorer 8 or older. If a more up-to-date version of that browser is present, it creates a virtual desktop that's hidden from the user. From this second desktop environment, Magala installs the MapsGalaxy Toolbar (a previously analyzed adware program) for IE, locks the browser's homepage to a related URL, and begins generating automatic search queries. It 'clicks' on the results at an interval of ten seconds, thereby creating revenue from the advertisement-viewing counts. Malware researchers note that the latter, in particular, should occur invisibly to the user, which contrasts with traditional adware.

Keeping the Advertising Farm Off Your Computer

Magala's symptoms are almost entirely limited to the resource expenditures it uses to conduct the above activities. Since the Trojan gathers data on its search queries from a remote server, the users of infected systems may be able to limit or block Magala's payload by disabling their Internet connections. Systems without Internet Explorer or with an old version of the browser also should remain unaffected.

Although not meant to harm the user directly, Magala holds the same, core dangers as a more traditional adware program: it loads advertisements automatically, and in sufficient quantity to risk endangering your PC with unsafe content. Due to the brevity of its symptoms, using active anti-malware protection is the easiest way to identify Magala either before it installs itself or afterward. Victims should delete Magala with such products, when possible, and scan any bundle-based installers that aren't from reputable sources.

Magala is a representative of how irrelevant the person who's manning the keyboard is to the goals of a modern threat campaign. Trojan attacks serve for creating money any way they can do so largely, and the user is, at best, a tool, or even an impediment to that goal.

Loading...