Categories: News

Villains used Windows Background ITS for Ryuk attacks

Attackers use Windows Background Intelligent Transfer Service (BITS) to implement malicious payloads on Windows computers. Of course, they do this stealthily.

A recent research proves that attackers use an unknown persistence mechanism which shows they used BITS to launch the backdoor.

Windows Background ITS – a tool for attackers

An ever-shifting phishing campaign hit hospitals and medical centres, last year. Thus, the attackers distributed a custom backdoor, which opened the way for RYUK ransomware attacks.

FireEye revealed the new mechanism which takes advantage of the BITS. In fact, BITS came to users starting Windows XP. It’s a component which uses the inactive network bandwidth.

So, it facilitates the transfer of files between computers. In order to do this, BITS creates a container with the files.

Its creators came with BITS to deliver updates for the OS and also to fetch malware signature updates. But some other apps also use it, such as Mozilla Firefox. Thus, they allow downloads to continue, even though the browser is closed.

How hackers worked?

According to FireEye, “when malicious applications create BITS jobs, files are downloaded and/or uploaded in the context of the service host process.” So, hackers use this technique to evade firewalls that might block processes.

Also, “it helped them obscure which application requested the transfer.” Thus, Ryuk infections managed to make such jobs like “system update” in order to launch executable files. These triggered the backdoor after they trying to download an invalid URL.

“Researchers mentioned that “The malicious BITS job was set to attempt an HTTP transfer of a nonexistent file from the localhost.” Because the file does not exist, BITS launches a notify command, which is the backdoor.

In order to help with the incident response, researchers came with BitsParser, a Python utility which extracts job and file for further analysis.

Laurentiu Titei

Recent Posts

Checksum File: Meaning, How to Open and Verify It on Windows

Are you worried that the downloaded file may be compromised by malware or other cybersecurity…

2 hours ago

ASIO Driver Download and Update for Windows 11/10

Does the delay between playing a note and hearing it back on your computer sound…

1 day ago

How to Set Your Time and Time Zone Manually in Windows 11 & 10

With remote setups becoming common, working in different time zones is no surprise. However, if…

2 days ago

Set Up Windows Hello for Sign-in with Face, Pin & Fingerprint

Windows Hello is a feature in Windows 10 and 11 that lets you log in…

3 days ago

Best Free PC Cleaner and Optimizer for Windows 10, 11 in 2026

In this comprehensive overview, we delve into the best free PC cleaner and optimizer tools…

3 days ago

The Best Anti-Malware and Protection Software for Windows PC

If you want to protect your system against malware attacks, then you can take the…

4 days ago