iTranslator Driver-based Trojan
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication, it is unclear how iTranslator is distributed, although there are unconfirmed reports indicating it is being delivered as an executable file via medium-scale spam campaigns or drive-by-downloads from compromised websites.
When opened, this executable file will download and install the initial driver as well as a dynamic link-library (DLL) file. This first driver will attempt to maintain persistence before extracting and loading the DLL. The DLL appears to be the primary iTranslator module, and is responsible for installing a secondary network filter driver and trusted SSL certificates on all available Internet browsers. It will then uses these to collect user information and perform man-in-the-middle attacks.
Remediation advice
To prevent and detect a trojan infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:46 pm