Would you volunteer your computer’s resources to help a political cause?
It is a strange question, but it’s one being asked by Kelihos botnet spammers to Russian citizens. So reads the spam message:
We, a group of hackers from the Russian Federation, are worried about the unreasonable sanctions that Western states imposed against our country. We have coded our answer and below you will find the link to our program. Run the application on your computer, and it will secretly begin to attack government agencies of the states that have adopted those sanctions.
Referencing political actions taken by Western nations against Russia for its recent relations with Ukraine – and hoping to incite the ire of displeased Russian citizenry – the link provided in the message actually leads to malware. More specifically, users who click are connected to the Kelihos botnet, which is capable of the following malicious activities:
- Password theft from web-browsers and other programs
- Bitcoin theft and mining
- Establishment of “backdoors” for future access to the infected machine
- Hijacking infected PCs to perform DDOS attacks
- Downloading more malware
- And, of course, sending more spam
According to reports from PC World, the variant disbursed by this latest campaign also borrows digitally signed files from a legitimate network monitoring software to spy on infected users and reduce the chances of detection.
Whether or not “volunteers” actually get to participate in a digital attack against Western states is unconfirmed. Kelihos is capable of commanding bots to carry out DDOS attacks, and such attacks could, in theory, be carried out against Western governments’ websites; but, all of the little extra things the botnet can do suggest that this politically-charged variant of Kelihos is nothing more than malware, waving a false flag.
The takeaway?
Social engineering is a dangerous beast, especially when it leverages contentious current events. As a rule of thumb, if an email provokes an emotional reaction, it is usually best to stop and think (and maybe even walk away) before you click.
…And as for those seeking political action – whatever the viewpoint – there are much better ways to implement change than clicking on Internet chain mail ![]()
Have a great (bot-free) day!
For the full story and source of quote, see Hackers prey on Russian patriotism to grow the Kelihos botnet, at PC World.
Related Posts:
- Emsisoft Explains the Syrian Electronic Army
- Facebook Fights Malware, Calls Greek Police and Wins
- New Sefnit Variant Adopts SSH to Commit Click Fraud
- The MiniDuke of Ukraine
- Gameover Zeus Decides to TRY AGAIN
Kelihos Botnet Spam Waves False Russian Flag

Attention customers of 51 US-based UPS stores: It is time to cancel your credit/debit card.
A new browser-based rogue security scanner Microsoft has named Rogue:Win32/Defru pretends to find malware on your computer, attempts to sell you fake security products, and prevents you from connecting to over 300 common websites – many of which belong to companies that sell legitimate security products. Those familiar with rogue security products will know that such capabilities have been employed by attackers for years; however, Microsoft reports that Defru is notable due to its simplified, browser-based approach.
Defru modifies the infected PC’s hosts file, which is responsible for website navigation. If the user attempts to navigate to one of more than 300 websites Defru has been designed to recognize, they will instead be redirected to an infamous “PC Defender” rogue site: pcdefender[.]co[.]vu.
Facebookers beware. Research has confirmed that malware comes in every color, and that an old trick has struck again. It’s called the Facebook color changer, and it is downright malicious.
WordPress Alert: Users running WordPress versions 3.5-3.9 and Drupal versions 6.x-7.x are vulnerable to a newly discovered denial of service attack which can render both website and web server completely inaccessible.
When you think about malware, you probably imagine a nasty little file that’s been installed on your computer. When you think about anti-malware, you probably imagine some sort of program that can remove that nasty file, and help you go about your day, malware-free. Malware doesn’t always need files though. And anti-malware can’t always do its job through file detection alone.
Flash drives: we share them with friends knowing full well that if they come back with some mysterious .exe the last thing we should do is open it. Easy enough to remember and easy enough to avoid. But what if the malware is hidden? What if there’s no trace of malware, or .exe, at all?