Rogue Windows Background Intelligent Transfer Service jobs can linger after malware clean-up and re-infect systems Credit: Thinkstock Attackers are abusing the Windows Background Intelligent Transfer Service (BITS) to re-infect computers with malware after they’ve been already cleaned by antivirus products.The technique was observed in the wild last month by researchers from SecureWorks while responding to a malware incident for a customer. The antivirus software installed on a compromised computer detected and removed a malware program, but the computer was still showing signs of malicious activity at the network level.Upon further investigation, the researchers found two rogue jobs registered in BITS, a Windows service that’s used by the OS and other apps to download updates or transfer files. The two malicious jobs periodically downloaded and attempted to reinstall the deleted malware.Even though it’s not very common, attackers have abused BITS to download malware since as far back as 2007. An advantage of using this approach is that BITS is a trusted service and is not blocked by the computer’s firewall. However, the new Trojan program discovered by SecureWorks — part of the DNSChanger malware family — also abuses a little-known BITS feature to execute the downloaded file. This removes the need for malware to already exist on the system.After completing the transfer, the rogue job executes a command as a BITS “notification” action. The command creates and launches a batch script called x.bat, which completes the BITS job, checks if the file has been saved and loads it in the computer’s memory as a DLL. Through this technique, the attackers created “self-contained, download-and-execute BITS tasks that persisted even after the original malware was eliminated,” the SecureWorks researchers said Monday in a blog post.Another problem is that while the Windows event log showed information about the previous BITS malicious transfers, the logged information about the pending tasks was limited. The researchers had to use other tools to parse the BITS jobs database to see the full details.BITS jobs expire after 90 days but can potentially be renewed. In the case investigated by SecureWorks, the computer had been infected on March 4 and was cleaned by antivirus software 10 days later. The BITS job remained until it was discovered in May.Companies should consider enumerating active BITS tasks on computers that continue to generate network or host security alerts after malware remediation, the researchers said. One way to do this is to execute the bitsadmin client from a cmd.exe session with elevated privileges by typing: bitsadmin /list /allusers /verbose. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe