Home Malware Programs Ransomware Trojan-Proxy.PowerShell

Trojan-Proxy.PowerShell

Posted: August 23, 2016

Threat Metric

Threat Level: 9/10
Infected PCs: 95
First Seen: August 23, 2016
OS(es) Affected: Windows

Trojan-Proxy.PowerShell is a browser hijacker and banking Trojan that redirects its victims from legitimate bank domains to fraudulent ones. Currently, Trojan-Proxy.PowerShell's campaign only is confirmed for targeting Brazilians, most likely as a result of the increased activity provoked by the Olympic Games. Brazilian PC users should monitor their bank accounts for any unauthorized transactions and use anti-malware products for removing Trojan-Proxy.PowerShell infections before they can cause any damage.

Shelling out Reais to PowerShell Trojans

It's not unusual for threatening software to hijack different components of Windows in the course of their attacks. In 2016, malware experts have seen numerous examples of these threats using PowerShell, such as the PoS-targeting PowerSniff Ransomware. However, it's rarer for dedicated spyware to use similar techniques, which makes the confirmation of the new Trojan-Proxy.PowerShell campaign as mildly noteworthy.

Like many Trojans of the year, Trojan-Proxy.PowerShell only targets PCs with the Brazilian Portuguese set as the default language, making Olympics traffic a high priority. It uses fake mobile phone receipts transferred over e-mail to install itself and then launches an instance of PowerShell to a command-line and associated scripts. Trojan-Proxy.PowerShell uses this access to modify the proxy settings of Internet Explorer, thereby allowing the Trojan to hijack your Web server traffic. Past browser hijackers have launched similar attacks, included, perhaps, most infamously, DNS Changer.

Trojan-Proxy.PowerShell redirects the Web surfer from any of several, previously-specified bank websites, all of which are local to Brazil. Malware experts have found these attacks capable of causing various forms of damage, but especially exposure to copycat or 'phishing' sites that fake the appearance of bank websites. Victims may enter their password or other information, without realizing that their browser has loaded a separate, almost identical (but corrupted) website.

Powering Your Way Through the Trojan-Proxy.PowerShell Heists

Although malware analysts have noted regular activity from threat authors interested in hijacking Brazilian bank accounts with minor configuration changes, Trojan-Proxy.PowerShell's attacks are capable of impacting other regions potentially. Even more importantly than that, Trojan-Proxy.PowerShell's default payload modifies settings that are used by more browsers than just Internet Explorer: they also impact other browsing programs that don't provide separate proxy settings. Well-used products in that category include Chrome and Edge, although malware experts note that Firefox users have independent proxy settings that make them immune to the current Trojan-Proxy.PowerShell's hijackings.

Redirects to phishing sites may be visible from their minor anomalies in any Web addresses or Web page formats. PC users who believe their accounts or PCs compromised by Trojan-Proxy.PowerShell should notify their banks and change any critical login information immediately. After removing Trojan-Proxy.PowerShell with any suitable anti-malware tools, use Microsoft's recommended solutions for restoring default proxy settings for your version of Windows.

Precautionary anti-malware defenses become especially important when both Windows features and safe Web browsers can turn against your PC. Stay informed on the conventional means of receiving mobile phone receipts and, when in doubt, avoid clicking on files that could be installers for Trojan-Proxy.PowerShell.

Loading...