Here’s a new way to get Microsoft to pay attention to you: slip a brief message into the malicious Trojan horse program you just wrote.

That’s what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.

The message is surprisingly cordial, given that Microsoft’s security researchers spend their days trying to put people like Zlob’s author out of business. “Just want to say ‘Hello’ from Russia. You are really good guys. It was a surprise for me that Microsoft can respond on threats so fast,” the hacker wrote, adding, “Happy New Year, guys, and good luck!”

Zlob is one of the most common types of Trojan programs used to attack Windows these days. In a typical Zlob scam, the victim is sent a link to what looks like an interesting video. When the link is clicked, the user is told to install a multimedia codec file in order to watch the video. That file is actually malicious software.

It’s not clear whether the author of this message is the creator of Zlob, according to Joe Stewart, a researcher with SecureWorks. That’s because “Zlob is one of those things that gets mislabeled by AV companies a lot,” he said via email. “Basically any time they see malware being spread by ‘you need this video codec…’ messages in multimedia files, it gets the Zlob label.”

This isn’t the first time this particular hacker has sent a note to Microsoft’s security group. Last October he wrote a slightly creepy message, saying, “I want to see your eyes the man from Windows Defender’s team.”

Unlike the October message, this latest note wasn’t caught by Microsoft. It was found Friday by a French security researcher using the hacker handle S!Ri.

According to this latest message, it may be the Zlob hacker’s last note to Microsoft. “We are closing soon,” he wrote. “So, you will not see some of my great 😉 ideas in that family of software.”

Explore More

Tracking Down A BotNet

This will not be very long, nor will I go into excessive amounts of detail into the tools and steps required. The purpose of this paper is simply to help

LFI/RFI testing and exploiting with fimap

fimap is currently under development but still usable. Feel free to test it! This document and tool is not recommend for people who doesn’t know what LFI/RFI is. If you

Credit card fraud! How to protect ourselves from this identify theft?

Credit card or the plastic money has given us lot of convenience on the good side and hell lot of head ache on the bad side. Credit card fraud as