Home / malwarePDF  

Trojan:JS/Iframe.BT


First posted on 31 August 2012.
Source: Microsoft

Aliases :

Trojan:JS/Iframe.BT is also known as JS/IFrame.OA.gen (Command), Trojan.JS.Iframe.BRK (BitDefender).

Explanation :



Trojan:JS/Iframe.BT is a detection for a trojan that redirects your browser to other sites. These sites may attempt to download and install malware onto your computer, often by exploiting software vulnerabilities.

Make sure you install all available updates for your computer to help prevent the downloading of additional malware. For more information on updating software, including Java, Adobe and Microsoft products, please see the Additional information section in this entry.

This trojan is a malicious JavaScript file that creates a hidden IFrame. The JavaScript file is embedded into compromised webpages, usually via SQL injection or through Blackhat search engine optimization (SEO) poisoning.



Installation

When you visit a website that contains Trojan:JS/Iframe.BT, your browser is redirected to another website that may download malware onto your computer. The malware could be any of the attacker's choice, and is typically downloaded onto your computer by exploiting software vulnerabilities.



Payload

Redirects webpages

In the wild, we have observed Trojan:JS/Iframe.BT redirecting to a large list of malicious URLs, including the following:

  • hxxp://hotplay24.net
  • hxxp://onmouseup.info/stats.php
  • hxxp://www.lifeshiftdevelopment.com/stats.php
Additional information

Software vulnerabilities are fixed through the application of updates or patches from the software manufacturer.

The best way to protect your computer from exploits is to ensure that the versions of your software are up-to-date. Follow these links for more information on updating software that is commonly targeted by malware:

  • Microsoft Malware Protection Center - Updating Software
  • Java updates
  • Adobe updates (Acrobat, Reader, Flash, Shockwave)
  • Microsoft updates via the Microsoft Update tool (including Windows, Office, and Internet Explorer)




Analysis by Wei Li

Last update 31 August 2012

 

TOP