The Latest in IT Security

New malicious IRC bot discovered


The Russian anti-virus company Doctor Web is warning users about the program BackDoor.IRC.Aryan.1, which can download other malicious programs from a remote server controlled by intruders and mount DDoS-attacks upon command by an IRC server.

The malicious application BackDoor.IRC.Aryan.1 can be classified as an IRC bot. It spreads by copying itself to removable drives: the program creates its folder and the autorun.inf file in the infected drive’s root directory. IRC.Aryan.1 also uses another method to infect removable data storage devices. It copies itself onto the disk, hides files found on the media into a folder, and replaces them with shortcuts linked to the hidden files as well as to the bot’s copy. As a result, when the user double-clicks on such a shortcut, it doesn’t merely opens the desired file but also runs BackDoor.IRC.Aryan.1. Once the disk is infected successfully, the bot notifies criminals via their IRC channel .


Then the malignant application copies itself as the svmhost.exe file into a folder and puts a link to this file into the registry branch responsible for launching applications automatically upon Windows startup. Also, the bot tries to inject its code into the process explorer.exe.

Among other features, BackDoor.IRC.Aryan.1 has a self-defense mechanism. It uses a separate thread to continuously check whether its file is present on the disk, and if the file is not found in the destination folder, it will save it again from memory to the disk. At the same time, it verifies whether its entry is found in the Windows Registry. In addition, BackDoor.IRC.Aryan.1 attempts to inject the code that would repeatedly restart the malicious program into the processes csrss.exe, alg.exe, and dwm.exe.

BackDoor.IRC.Aryan.1 can download various executable files from a remote server, run them on the infected computer, and carry out DDoS-attacks upon command. The program’s signature has been added to the Dr.Web virus databases. Doctor Web also advises users to exercise caution when working with removable storage devices and, if possible, disable the AutoRun feature in the operating system’s settings.

Leave a reply


MONDAY, JULY 13, 2020

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments