Do *NOT* download the Teamspeak patch!

Front page items.
Post Reply
Avalanche
Posts: 865
Joined: Sun Feb 22, 2004 8:00 am
Location: Stockholm, Sweden, Tellus, Sol

Post by Avalanche »

Seems like somebody broke into a TS server and planted a "patch" full of malware. From SANS:
http://www.incidents.org/diary.html?storyid=2634
http://forum.goteamspeak.com/showthread.php?t=37007

QUOTE Gaming Malware
Published: 2007-04-15,
Last Updated: 2007-04-15 21:57:36 UTC
by Marcus Sachs (Version: 2)
A reader alerted us to new malware aimed at online gamers. Over at Teamspeak (providers of a very popular voice communications program used by gamers) some users signed up for their discussion forums received an email like this:

-----Original Message-----
From: nospam@goteamspeak.com
Sent: Saturday, April 14, 2007 8:49 PM
To: <deleted>
Subject: New Team Speak Patch [Link Inside]

Now you can download new Team Speak patch. It will help you to use our
Team Speak servers.
We advise you to download it now
hxxp://www.goteamspeak.com/downloads/patch.exe

Many of our seasoned readers know where this is going. Unfortunately many gamers are not as aware of computer-based social engineering tricks and very likely downloaded "patch.exe" without a second thought. We downloaded the malware (it is no longer available, so happy hunting if you are looking for a sample) and ran it through VirusTotal. The results were not encouraging. The only hits we received were:

Antivirus Version Update Result

CAT-QuickHeal 9.00 04.14.2007 (Suspicious) - DNAScan
ClamAV devel-20070312 04.15.2007 Trojan.Spy-4392
Fortinet 2.85.0.0 04.15.2007 W32/LdPinch.BEO!tr.pws
Ikarus T3.1.1.5 04.15.2007 Trojan-PWS.LDPinch.1607
Kaspersky 4.0.2.24 04.15.2007 Trojan-PSW.Win32.LdPinch.beo
Panda 9.0.0.4 04.15.2007 Suspicious file
Webwasher-Gtwy 6.0.1 04.14.2007 Win32.Malware.gen (suspicious)

Aditional Information

File size: 48640 bytes
MD5: 488b22114f1a08dc68a7e2cc34bf1d01
SHA1: 3da87252c917493e591c6ea222637910fff07a5e

There was some discussion a few hours ago in the TeamSpeak forums, but currently the forums appear to be offline. We'll keep monitoring this and will post any updates if needed.

UPDATE (2157 UTC) The forums are alive again. Follow the link above to see what is being discussed. There is a lot of speculation that the evil file was inserted due to vulnerabilities in TeamSpeak's forum software.[/quote]

So, if you have already installed it you will have to do some serious cleaning of your computer...
Last edited by Avalanche on Mon Apr 16, 2007 4:03 pm, edited 1 time in total.
/Avalanche

Image
Image
Image
Any technology, no matter how primitive, is magic to those that do not understand it. (Mark Stanley, Freefall, 1999)
Quod licet Iovi, non licet bovi
12/27/07 20:48:39: <Player in trouble> (all): Run its AVA
ImmortalZ
Posts: 5048
Joined: Mon Sep 08, 2003 7:00 am
Location: India
Contact:

Post by ImmortalZ »

How did they insert the file into TS' official servers?

Dayumn.

/me pats his NOD32. /blink.gif" style="vertical-align:middle" emoid=":o" border="0" alt="blink.gif" />
Avalanche
Posts: 865
Joined: Sun Feb 22, 2004 8:00 am
Location: Stockholm, Sweden, Tellus, Sol

Post by Avalanche »

*Points up and points out that NOD32 was not among those actually catching the malware...*

Seems to be an exploit in their message board system that they used to inject the file.
Last edited by Avalanche on Mon Apr 16, 2007 1:29 pm, edited 1 time in total.
/Avalanche

Image
Image
Image
Any technology, no matter how primitive, is magic to those that do not understand it. (Mark Stanley, Freefall, 1999)
Quod licet Iovi, non licet bovi
12/27/07 20:48:39: <Player in trouble> (all): Run its AVA
AdmiralKirk
Posts: 14
Joined: Mon Feb 12, 2007 10:52 pm

Post by AdmiralKirk »

If they used an older version of IPB thier was a vulnerability that allows you to run PHP code embeded in a post, which can allow you to upload a PHP script that will give you full control over anything PHP can touch. (Usualy the entire webserver). I had this happen to a forum system I admined once, pain in the but. Crazy nice php control script though ^^ In russian but it could do almost anything.
ImmortalZ
Posts: 5048
Joined: Mon Sep 08, 2003 7:00 am
Location: India
Contact:

Post by ImmortalZ »

I got hold of the EXE Ava. NOD32 heuristics caught it as possible Trojan/Malware.

/me pats his NOD32.
pkk
Posts: 5419
Joined: Tue Jul 01, 2003 7:00 am
Location: Germany, Munich

Post by pkk »

The Escapist (Justin Emerson) @ Dec 21 2010, 02:33 PM:
The history of open-source Allegiance is paved with the bodies of dead code branches, forum flame wars, and personal vendettas. But a community remains because people still love the game.
Pook
Posts: 1758
Joined: Tue Aug 13, 2002 7:00 am
Location: Texas, USA

Post by Pook »

(They use vBulletin)

/owned-anim.gif" style="vertical-align:middle" emoid=":owned:" border="0" alt="owned-anim.gif" />
Image
Post Reply