The Latest in IT Security

BKDR_SHIZ Responsible For SAP Attacks, And More

16
Nov
2013

There have been recent reports of malware that targeted SAP users for information theft. We detect this threat as BKDR_SHIZ.TO, and it belongs to a malware family that has been detected since 2010. So far, this particular family has received little attention, but its targeting of SAP applications has raised its profile considerably.

So what do we know about this malware? It primarily acts as a backdoor that logs keystrokes entered by users into certain applications, most notably SAP applications.  However, SAP is far from the only target, as the following code highlights:


Figure 1. BKDR_SHIZ searching for applications

This portion of its code checks if certain applications are running on the affected system. It also checks if the file is located in the “right” folder for each application, to ensure that actual installed programs (and not, for example, backups with the same file name) are the ones being logged.

If an application on the list is present, its location is logged and sent to the backdoor’s command-and-control (C&C) server.  This allows the attacker to know exactly what applications are installed on the system.

The list of applications targeted is very broad. In the sample shown above, aside from SAP, there are already other classes of products targeted, like encryption software and Bitcoin/Litecoin wallets. In addition, it also targets various games, although most of these were released several years ago.

Its primary routine, aside from this app scanning, is keylogging. It does not limit itself to any application identified earlier; instead the keystrokes inside any active window are logged. The logs are organized using the name of the active window, the time, and the actual keystrokes logged.

Figure 2. Portion of keystroke log

Beyond these routines, it has fairly typical backdoor capabilities. It can:

  • Download and execute files
  • Restart the operating system
  • Update itself

While BKDR_SHIZ.TO does possess the ability to steal information from SAP users, it does not really do so in a “targeted” manner. It is not clear if this may lead to further attacks targeting SAP users; that is certainly one possibility, but others are also possible. It is clear that this particular malware is very indiscriminate when it comes to information theft, making the determination of its goals particularly difficult.

Leave a reply


Categories

SATURDAY, AUGUST 24, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks