Home Malware Programs Trojans Mirage

Mirage

Posted: September 24, 2012

Threat Metric

Threat Level: 9/10
Infected PCs: 48
First Seen: September 24, 2012
OS(es) Affected: Windows

Mirage is a backdoor Trojan that's currently utilized for industrial spying efforts in the energy, oil and military sectors. Like other attacks that target industrial/business PCs, Mirage appears to be designed by a competent group of hackers with steady funding and a brisk development cycle, and SpywareRemove.com malware researchers note that Mirage may be undetectable by insufficiently advanced or outdated anti-malware programs. Fortunately, Mirage's propagation uses an easily-identified entry point: e-mail spam that presents Mirage's installer as a PDF attachment. Because this is a very common means for distributing many types of malware, you should always scan such file attachments before opening them to protect your computer from both Mirage and many similar types of malicious software.

Mirage – Far from a Mere Illusion of Danger to Your Computer

Mirage's origins have yet to be determined with clarity, although it has been considered noteworthy by some that some of the proxy applications used by Mirage are of Chinese origin. As a backdoor Trojan that's purposed for attacks against specific industries, a la Stuxnet or Flame, Mirage can be considered a negligible danger to those who use PCs for personal entertainment purposes – at least, for the moment. However, Mirage's attacks have targeted many businesses in countries throughout the world, including Canada, northeast Africa, Taiwan and the Philippines. SpywareRemove.com malware researchers have found that preferential targets for Mirage appear to be associated with rights for oceanic resource development, such as oil and gas.

Mirage's attacks begin with humble e-mail messages that request that you download an included file attachment. Even though this file looks like a PDF file, it actually is an EXE with an inaccurate file name. Once it's launched, this file will display a real PDF file to cover up its installation of Mirage. SpywareRemove.com malware researchers can recommend displaying all file extensions to distinguish real PDFs from fake ones, and additionally encourage you to scan suspicious file attachments before opening them as a matter of habitual PC safety.

When PC Security Gets Exploited Against You by Mirage

Mirage uses some unusually-advanced security methods to protect itself, including making usage of SSL protocol (a security feature often used to protect passwords and other confidential transmissions of data) to make its attempts to contact a Command & Control server look like simple Google searches. Current estimates by Dell SecureWorks put the number of infected PCs at potentially over one hundred, and SpywareRemove.com malware researchers also emphasize that Mirage's attack campaign and development appear to be ongoing. Investigations into Mirage's attacks have revealed a number of associated Hotmail and Yahoo accounts, although confirmation of the identity of Mirage's hacker (or hackers) is still forthcoming.

Unfortunately, current research by SpywareRemove.com malware analysts and others hasn't yet revealed the specific information that Mirage apparently is being used to steal. However, like any Trojan of its type, the backdoor Trojan Mirage should be considered to be indicative of compromises to valuable and personal information until it can be verified otherwise, and Mirage infections always should be removed with appropriate anti-malware software.

Related Posts

Loading...