Accounts Compromised by Trojan

New malware steals account info, even from accounts with a Blizzard authenticator
A computer Trojan is spreading that can compromise accounts and steal the account information, even for accounts protected by a Blizzard authenticator. This malware is primarily being spread in a fake version of the Curse Client, which is a popular program that updates addons for World of Warcraft. The Trojan uses a Man-in-the-middle attack to capture the login and authenticator information when a player tries to log into a Blizzard game like Diablo III, and then steals that info.

Details about the issue were posted in the World of Warcraft Customer Support forums, and the Trojan was tracked down and can be easily removed. The companies who make the major anti-virus software have been notified, and have updated their programs to catch the Trojan. Since this can affect any user, Diablo III players who do not play World of Warcraft could still be infected; there are unconfirmed reports that other programs may also be spreading the Trojan.

Here is the info from the initial post by a Blizzard Customer Support agent:
We've been receiving reports regarding a dangerous Trojan that is being used to compromise player's accounts even if they are using an authenticator for protection. The Trojan acts in real time to do this by stealing both your account information and the authenticator password at the time you enter them.

If your account has been compromised recently, I'd recommend looking for the Trojan. It can be identified by creating an MSInfo file and then looking in the Startup Program section of that file for either "Disker" or "Disker64". It will usually appear like this:

Disker rundll32.exe c:\users\name\appdata\local\temp\w_win.dll,dw Name-PC\Name Startup
Disker64 rundll32.exe c:\users\name\appdata\local\temp\w_64.dll,dw Name-PC\Name Startup

The simplest way to remove the Trojan is by using the Malwarebytes program, which eradicates many forms of malware. This is detailed in the followup Blizzard post that gives more specifics about the Trojan.
Update: With the help of our awesome MVPs, we've identified the source and a method to remove this Trojan.

To summarize for those of you that haven't read the green posts:

-The trojan is built into a fake (but working) version of the Curse Client that is downloaded from a fake version of the Curse Website. This site was popping up in searches for "curse client" on major search engines, which is how people were lured into going there.

-At this point, it seems the easiest method to remove the trojan is to delete the fake Curse Client and run scans from an updated Malwarebytes. Should you still have issues, there is a more manual method that Ressie posted earlier in the thread.

-Thanks to Ressie's efforts, most security programs should be able to identify this threat shortly, if not by the time I type this.

-If you were compromised, follow the instructions here and we'll do our best to set everything right (as we always do).

-For those of you interested in these MitM style attacks, this is the only confirmed case we've seen in several years outside of the "Configuring/HIMYM" trojan in early 2012 that hit a handful of accounts. These sort of outbreaks are annoying, but an Authenticator still protects your account 99% of the time. Stay safe!
This new Trojan comes to light just a few days after the 'Reaper of Souls' Phishing Scam Warning, providing another example of the lengths that unscrupulous people will go to, as they try to obtain account info.
Feedback for Diablo Somepage