Trojan Uses False Adobe Certificate to Avoid Detection
It’s not unusual for cybercriminals to sign their creations with digital certificates, because the technique increases the malware’s chances to escape being detected by antivirus solutions. Symantec experts have spotted another fascinating example.
The malware, detected by Symantec as Backdoor.Trojan, is disguised as a file called “Word13.exe.”
The file has an Adobe Reader icon and it appears to be signed by a certificate issue by Adobe Systems Incorporated.
However, as experts highlight, the certificate is clearly fake, since Adobe is a VeriSign customer. In addition, the CA Root certificate is not trusted, which is another sign of a scam.
Once it’s executed, the malware injects itself into iexplore.exe and notepad.exe and opens a backdoor to allow its master to take over the infected device.
The trojan is capable of stealing information, creating folders, capturing screenshots, emulating mouse functions, stealing Skype information, and create, download, delete, move, and execute files.
Chat With Our System Analyst To Remove All Kinds Of Threats And Get Online Technical Support.