Threat Database Backdoors BKDR_SIMBOT.SMC

BKDR_SIMBOT.SMC

By GoldSparrow in Backdoors

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 6
First Seen: May 13, 2014
Last Seen: February 18, 2021
OS(es) Affected: Windows

BKDR_SIMBOT.SMC is a backdoor Trojan that has been distributed recently by taking advantage of a zero day vulnerability in the Microsoft Word. These types of vulnerabilities are particularly threatening because they may present before appropriate security protections can be established. This vulnerability, which is cataloged as CVE-2014-1761, was first uncovered in March. Although Microsoft patched this vulnerability in April, it has still been exploited by third parties since then, in order to distribute threats like BKDR_SIMBOT.SMC. This is why security analysts recommend updating all software on your computer, Microsoft Word in particular. BKDR_SIMBOT.SMC has been involved in targeted threat attacks on institutions located in Taiwan in the months of April and May.

The Main Target of BKDR_SIMBOT.SMC is Taiwanese Institutions

The two targeted institutions in Taiwan were a government agency and an educational institution. In both cases, the BKDR_SIMBOT.SMC attack initiated with a corrupted email message containing a file attachment with an exploit designed to take advantage of the Microsoft word vulnerability in order to execute threatening code on the targeted computer. Several intermediary infections may be involved in a BKDR_SIMBOT.SMC attack. Once installed, BKDR_SIMBOT.SMC allows other persons to take over the victim's computer in order to control it from afar, gather data or use it in other unsafe activities. BKDR_SIMBOT.SMC is a severe threat to a computer's security which should be dealt with immediately. A fully updated and solid security tool will be a determinative help to achieve BKDR_SIMBOT.SMC's removal.

BKDR_SIMBOT.SMC is Part of a Larger Threat Campaign

Malware analysts suspect that the recent BKDR_SIMBOT.SMC attacks are part of Taidoor, a widespread threat campaign that has been active since 2009. This suspicion is based on the fact that most Taidoor attacks may use the following strategies in common:

  • Taidoor attacks may begin with a social engineering lure that may present itself in the form of a targeted email message containing a corrupted file attachment.
  • Rather than being general threat attacks, Taidoor attacks may be targeted toward specific institutions that may be industrial or belonging to the government.
  • Taidoor attacks use zero day exploits like those used in this case to distribute BKDR_SIMBOT.SMC.

Trending

Most Viewed

Loading...