[FTP1.02] Gumblar or Troj/JSRedir-R FTP Virus

Known as Gumblar by ScanSafe and Troj/JSRedir-R by Sophos, this computer virus first appeared in 2009. It is characterized by re-directing user's Google searches and is suspected to come from Adobe Flash and PDF files.

Personal Computers

Visitors to an infected site will be redirected to an alternative site containing further Malware, which was once gumblar.cn, but has now switched to a variety of domains. The site sends the visitor an infected PDF that is opened by the visitor's browser or Acrobat Reader. The PDF will then exploit a known vulnerability in Acrobat to gain access to the user's computer.

The virus will find FTP clients such as FileZilla and Dreamweaver and download the clients' stored passwords. It also enabled promiscuous mode on the network card, allowing it to sniff local network traffic for FTP details. It is one of the first viruses to incorporate an automated network sniffer.

Servers

Using passwords obtained from site admins, the host site will access a website via FTP and infect the website. It will download large portions of the website and inject malicious code into the website's files before uploading the files back onto the server. The code is inserted into any file that contains a <body> tag, such as HTML, PHP, JavaScript, ASP and ASPx files. The inserted PHP code contains base64-encoded JavaScript that will infect computers that execute the code. In addition, some pages may have inline frames inserted into them. Typically, iframe code contains hidden links to certain malicious websites. The virus will also modify .htaccess and HOSTS files, and create images.php files in directories named 'images'. The infection is not a server-wide exploit. It will only infect sites on the server that it has passwords to.

Gumblar variants

Different companies use different names for gumblar and variants.. Initially, the malware was connecting to gumblar.cn domain but this server was shutdown later. However, many badware variants have emerged after that and they connect to various malicious servers via iframe code. Whatever be the nature of gumblar variants, all of them can be categorized as iframe virus.

Gumblar resurfaced in January 2010, stealing FTP usernames and passwords and infects HTML, PHP and Javascript files on webservers to help spread itself.

A solution called FTP Lock has been introduced. Please search for:

[FTP1.01] New "FTP Lock" Security Measure

for more information about the virus, please read:

http://en.wikipedia.org/wiki/Gumblar

Was this answer helpful?

 Print this Article

Also Read

[FTP2.03] I'm trying to upload a large file onto my webspace, and the file manager inside the Control Panel won't let me. Why?

This is due to the nature of the web based FTP used, and your browser/ISP connection timing out...

[FTP4.02] Can I upload my files to the server at any time?

Yes. We provide you unlimited FTP access to your account 24 hours a day, 365 days a year,...

[FTP3.04] How do I publish my site with Adobe GoLive?

When you're ready to publish your site, just connect to the FTP server by clicking the FTP Server...

[FTP2.01] I've uploaded my site on my hosting account but cannot see it?

As a first step, check the following points:- Is your domain on the correct name servers? To...

[FTP4.07] Can I connect to your FTP servers using command line FTP in Windows?

Yes, we have no restrictions regarding the use of the windows command line to connect to our...