text
stringlengths
4
429
within
organizations.
2012
Zscaler
Inc.
Seculert
Ltd.
Rights
Reserved.
MSUpdater
Trojan
Incidents
Observed
Zscaler
Seculert
separately
identified
security
incidents
where
infected
customers
fore-
mentioned
industries
command
control
(C&C)
beacons
matching
below
patterns.
Standard
Microsoft
Internet
Explorer
user-
agent
strings
(versions
were
observed
communications.
most
often
observed
pattern,
likely
check-
behavior
followed
pattern:
HTTP
requests
path:
/microsoftupdate/getupdate/default.aspx?ID=[num1]para1=[num2]para2=[num3]para3=[num4
Where
[num]
fields
placeholders
parameters
passed
victim
form
numbers.
Other
patterns
observed
from
infected
hosts
C&Cs
were:
HTTP
POST
requests
path:
/microsoft/errorpost/default/connect.aspx?ID=[num1]
HTTP
POSTs
path:
/microsoft/errorpost/default.aspx?ID=[num1]
Clearly
above
patterns
trying
appear
though
they
related
Microsoft
Windows
Update
service
versus
something
malicious.
clear,
common
name