Saboteurs behind the Pushdo botnet are sending spam to a website meant to educate users on malware, researchers have found.
Blue Coat Systems researchers Chris Larsen and Jeff Doty co-authored a blog post on Wednesday, which detailed how the site, PracticalMalwareAnalysis.com, was being targeted with Pushdo-related spam.
Since the malware appeared in 2007, Pushdo has been repeatedly used to deliver data-stealing Trojans, such as Zeus and SpyEye, via its spamming module Cutwail. In this instance, the Pushdo botnet causes infected computers to spam out emails containing the Trojan Zeus, researchers found.
PracticalMalwareAnalysis.com was set up to market a book of the same name written by Michael Sikorski and Andrew Honig. The book is meant to provide readers with a “hands-on guide to dissecting malicious software”.
In addition to spreading Zeus, Pushdo operators coded the malware so that infected computers running a malware monitoring tool called FakeNet – which the authors of 'Practical Malware Analysis' created and released with the book – spam the companion site with emails. FakeNet allows analysts to create a 'fake' network capable of tracking malware.
In a follow-up email with SCMagazine.com on Thursday, Doty wrote that he saw a spike in Pushdo infections on 26th August, which likely means a spam campaign was active that day to spread the malware. As of Wednesday afternoon however, users were still downloading the malware, he said.
“After it compromises your machine, it starts to send out spam to all sorts of people,” Doty wrote of Pushdo. “That spam contains an attachment that is a Zeus payload."
[An earlier version of this story incorrectly stated that Pushdo attackers compromised the Practical Malware Analysis website, when instead, the botnet was used to spam the site.]