{"id":28903,"date":"2013-09-03T16:06:30","date_gmt":"2013-09-03T23:06:30","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=28903"},"modified":"2025-05-28T23:22:36","modified_gmt":"2025-05-29T06:22:36","slug":"cidox-trojan-spoofs-http-host-header-to-avoid-detection","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/","title":{"rendered":"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection"},"content":{"rendered":"<p>Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern generated contains a few interesting parameters, names like \u201c&amp;av\u201d (for antivirus?) and \u201c&amp;vm=\u201d(VMware?), The response received looked to be encrypted, which drew my attention. Also, all the network traffic contained the same host header pointing to metrika.yandex.ru. These samples turned out to be related to the Cidox Trojan family. Here is the Wireshark packet capture of the Get request:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28904\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png\" alt=\"cidox_http_traffic\" width=\"300\" height=\"228\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_http_traffic.png 770w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>One might immediately conclude that the host name in the Get request is the culprit and may be compromised, or it is an attacker\u2019s domain that isn\u2019t correct for this sample. The domain looked to be legitimate because yandex.ru is the largest search engine in Russia. To confirm, I quickly checked the packet capture for the DNS request and IP address (where the Get request was sent); it differs from the IP address of metrika.yandex.ru. This tells me that the host header in the Get request is spoofed and must be hard-coded in these samples.<\/p>\n<p>We have seen this trick used recently by malware authors in which HTTP host headers are spoofed to point to legitimate domains to evade detection based on host headers or to evade researchers or automated tools. The response from remote server was encrypted, so I decided to look into it.<\/p>\n<h2>The Malicious Binary: Explained<\/h2>\n<p>The malicious binary used a custom packer and wasn\u2019t difficult to unpack.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/unpack_data_mz.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28908\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/unpack_data_mz-300x201.png\" alt=\"unpack_data_mz\" width=\"300\" height=\"201\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/unpack_data_mz-300x201.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/unpack_data_mz-1024x688.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/unpack_data_mz.png 1152w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Once unpacked, you can see several interesting strings in the binary, below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_strings_unpacked.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28910\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_strings_unpacked-300x274.png\" alt=\"cidox_strings_unpacked\" width=\"300\" height=\"274\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_strings_unpacked-300x274.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_strings_unpacked.png 843w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>This binary checks whether the sample is running under VMware and also looks for antimalware services. Remember, the network traffic shown earlier contains \u201c&amp;vm=\u201d and \u201c&amp;av=\u201d parameters. We can conclude this binary sets those parameters based on the preceding checks. I could go on and on in this blog, but for your sake I will focus only on a couple of important items. The binary starts its main operation by the process replacement method to overwrite the memory space of a running process with a malicious executable. The binary creates an \u201cexplorer.exe\u201d process in suspended mode and maps the process memory with its own code, as shown next:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_create_process.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28912\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_create_process-300x218.png\" alt=\"cidox_create_process\" width=\"300\" height=\"218\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_create_process-300x218.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_create_process.png 859w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>It then executes the mapped binary code with the \u201cResumeThread\u201d procedure. The binary next drops a few files:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/dropped_explorer.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28913\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/dropped_explorer-300x91.png\" alt=\"dropped_explorer\" width=\"300\" height=\"91\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/dropped_explorer-300x91.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/dropped_explorer.png 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>It sets a registry key with the value that is the path to a DLL, so that each process using user32.dll will load this DLL. Also it drops some configuration files under the Cookies directory:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/dropped_cf_files.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28915\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/dropped_cf_files-300x99.png\" alt=\"dropped_cf_files\" width=\"300\" height=\"99\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/dropped_cf_files-300x99.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/dropped_cf_files.png 765w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The cf file is encrypted and we will look into the encrypted file shortly, but first we need to see the HTTP header generated by this binary. The binary collects information such as browser, operating system, antimalware and VMware checks, OS version (32 or 64 bit) etc. and prepares the HTTP Get request. Here is screenshot of the Get request header in process:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_get_request_header.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28916\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_get_request_header-300x146.png\" alt=\"cidox_get_request_header\" width=\"300\" height=\"146\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_get_request_header-300x146.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_get_request_header-1024x499.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_get_request_header.png 1376w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>As we suspected, the binary has a hard-coded host header, which points to metrika.yandex.ru, but the actual domain is different. It may come from a dropped encrypted configuration file. The response from server is encrypted as follows:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_encryted_response.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28917\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_encryted_response-300x66.png\" alt=\"cidox_encryted_response\" width=\"300\" height=\"66\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_encryted_response-300x66.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_encryted_response-1024x226.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_encryted_response.png 1555w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The binary uses custom <a href=\"http:\/\/en.wikipedia.org\/wiki\/Tiny_Encryption_Algorithm\">Tiny Encryption Algorithm (TEA)<\/a> to encrypt and decrypt the data. Here the call has been made to decrypt the response from the server:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_tea_call.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28918\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_tea_call-300x197.png\" alt=\"cidox_tea_call\" width=\"300\" height=\"197\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_tea_call-300x197.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_tea_call-1024x673.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_tea_call.png 1170w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>TEA uses a 128-bit key for its encryption and decryption routine. The binary uses two hard-coded keys: one for decrypting the data comes from the server and the second stores the data in encrypted format, as shown in the preceding image. It is easy to identify the encryption method used based on few constant values found in the algorithm. Here is snapshot of the TEA code:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/tea_decryption_code.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28921\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/tea_decryption_code-300x283.png\" alt=\"tea_decryption_code\" width=\"300\" height=\"283\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/tea_decryption_code-300x283.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/tea_decryption_code.png 738w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Once decrypted, the response turns out to be a configuration file containing domain names, as seen below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_decrypted_config.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28922\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_decrypted_config-300x160.png\" alt=\"cidox_decrypted_config\" width=\"300\" height=\"160\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_decrypted_config-300x160.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_decrypted_config-1024x546.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_decrypted_config.png 1558w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The binary stores this information in encrypted format in the file cf, as we saw earlier. The binary then downloads and installs another malicious program from a different server named in the configuration file. Here is the request:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/http_objects.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28925\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/http_objects-300x123.png\" alt=\"http_objects\" width=\"300\" height=\"123\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/http_objects-300x123.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/http_objects.png 758w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The request to dldc.php sends an encrypted response that contains another executable file.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/dldc_exe.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-28927\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/dldc_exe-300x125.png\" alt=\"dldc_exe\" width=\"300\" height=\"125\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/dldc_exe-300x125.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/dldc_exe-1024x427.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/dldc_exe.png 1539w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>We won&#8217;t go into the details of the downloaded binary. The attacker behind this Trojan collects a lot of information through the Get request, including antimalware or VMware checks. The binary makes detection difficult for automated processes or intrusion detection or prevention systems by using spoofed host header names and custom TEAs for encrypting data. As we have learned, we can\u2019t rely solely on the HTTP header host to judge whether the domain name used in an HTTP header is malicious.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1643,180],"coauthors":[3973],"class_list":["post-28903","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-embedded-security","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cidox Trojan Spoofs HTTP Host Header to Avoid Detection | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-03T23:06:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T06:22:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_http_traffic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"586\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection\",\"datePublished\":\"2013-09-03T23:06:30+00:00\",\"dateModified\":\"2025-05-29T06:22:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/\"},\"wordCount\":784,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png\",\"keywords\":[\"embedded security\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/\",\"name\":\"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png\",\"datePublished\":\"2013-09-03T23:06:30+00:00\",\"dateModified\":\"2025-05-29T06:22:36+00:00\",\"description\":\"Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection | McAfee Blog","description":"Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection | McAfee Blog","og_description":"Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2013-09-03T23:06:30+00:00","article_modified_time":"2025-05-29T06:22:36+00:00","og_image":[{"width":770,"height":586,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/cidox_http_traffic.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection","datePublished":"2013-09-03T23:06:30+00:00","dateModified":"2025-05-29T06:22:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/"},"wordCount":784,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png","keywords":["embedded security","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/","name":"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png","datePublished":"2013-09-03T23:06:30+00:00","dateModified":"2025-05-29T06:22:36+00:00","description":"Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/cidox_http_traffic-300x228.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cidox-trojan-spoofs-http-host-header-to-avoid-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Cidox Trojan Spoofs HTTP Host Header to Avoid Detection"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/28903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=28903"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/28903\/revisions"}],"predecessor-version":[{"id":214674,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/28903\/revisions\/214674"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=28903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=28903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=28903"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=28903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}