Security company Prevx has released details of a bizarre mini-war that has developed between itself and the creators of the notorious Gromozon malware website.On Sept. 1, Prevx was among the first to release an update for its Prevx1 anti-malware tool to block malware emanating from a web of Trojan-infected websites that turned out to have gromozon.com at its heart.The purpose of Gromozon appears to have been to infect users of Italian blogs and message boards with software for the purpose of generating fraudulent traffic to websites and, where appropriate, installing a premium-rate dialer. Displaying a range of complex behavior, an ability to evolve rapidly and the willingness to defend itself from counter-measures, Gromozon is considered among the most complex malware systems yet to emerge.On Sept. 20, Gromozon’s authors released a revised set of malware containing a rootkit that attempted to block sites—Prevx included—that had announced filters protecting against it. Prevx released a further tool within days to counter the rootkit subversion, only to discover that subsequent attacks now featured an extraordinary direct attack on the company itself. Anyone attempting to block the tool with anti-malware programs from a range of security companies would be confronted with a dialog box that claimed to be from Prevx, and one of its researchers, Marco Giuliani. “This program was blocked by our advertisement tool. Please visit http://www.REMOVED.com and make donation. Thanks for cooperation. Marco Giuliani & Prevx.com Team,” it read. There were also references to Prevx embedded in files used by the program, designed to confuse users.According to Jacques Erasmus of Prevx, Gromozon’s creators have taken the companies blocking personally, an unusual occurrence in an industry normally one of criminal impersonality. The current version of Prevx blocked Gromozon successfully, he said. “It’s them getting really frustrated at not being able to get around our tool,” he suggested. “We’ll have to wait and see what their next move is.”The oddity of Gromozon is that it attacks one of the Internet’s backwaters, Italy, using levels of sophistication unnecessary to infect users with humble click-fraud tools and premium-rate dialers. This suggested that it was a proof of concept, presaging further and more serious attacks in future, Erasmus said.Gromozon’s authors appear to have thought through not only the blocking of the malware, but the need to keep new versions away from security researchers. There was evidence that the malware ran checks on the geographical location of those downloading it in an attempt to avoid being detected by security researchers in places such as the United States.The Gromozon family of websites, which constantly changes, uses a particular hosting company in the Ukraine. “You need to know someone to get an account there,” said Erasmus.Although the named domain had been taken down, “Gromozon.com is not being hosted in a country with proper legislation,” which made it difficult to tackle.By John E. Dunn, Techworld.com Keep checking in at our Security Feed for updated news coverage. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe