ISmellBacon wrote:
Generally, when you connect to Teamviewer, you're connecting through their servers. Both the client and server connect outbound only. So it's unlikely the "IP connected to your friends machine through teamviewer matched the IP of the player he lost money to on the table (the hacker)."
HoldemManager doesn't allow remote access as far as I know, their main purpose is to ... well, manage hold'em. They inject code into the casino app to gain access to the game state, but they don't operate as a RAT.
"The malware ... pings the hacker, and is able take a file to download/run." What? Why would the hacker need to download/run a file if he/she was just viewing the opp's cards with TeamViewer?
Your entire story sounds very convoluted and doesn't really make any sense, especially from somebody claiming to be a "malware researcher." Even I, a mentally retarded pig, can see through this BS.
You pretty much managed to misunderstand everything I said, and you're also not as smart as you think you are. Let me break it down.
- Teamviewer is indeed not P2P, but teamviewer also uses an ID to connect to the other party that shows in the window title. For readers that haven't used Teamviewer before, I said IP just to make it simpler for them to understand. The story was complicated, I needed to trim the fat. Pokerstars noticed the ID matched in both windows on both players machines.
- I never said holdemanager is a RAT. I was saying this person used a cracked version with the trial removed. The person who cracked it, attached their own separate payload inside the program and had it run every time the person ran holdemanager. (this is why you should never use cracks)
- The malware that was in the holdemanager crack was simple, it was just what we call a 'loader'. It injects itself into a running process, and then sits and waits while sending out periodic pings back to it's C&C looking for a file to download and run. That's it's only functionality, as it keeps malware small and stealth. A popular loader for example was Smoke Loader. In this case, the loader was pulling in a teamviewer binary with some AutoIt script attached that installs it automatically, and sends the attacker back the ID pass to connect. This is the kind of malware your anti-virus/firewall will NOT catch.
Next time don't judge people, you should be grateful I even shared what I know. It's an almost certainty some scumbag will read this and get a smart idea.