![]() According to the Register, the FBI contacted one recipient of the PWS.Hooker Trojan e-mails, the ISP MonkeyBrains, and said it would very much like to see the contents of those log files. It stores this information in encrypted form before sending it to a variety of addresses. Unfortunately, it also carried a revised Trojan named PWS.Hooker, which records every key you type, and the application you typed it in. The revised version, BadTrans.B, released in late November, took advantage of a well-known Internet Explorer vulnerability that automatically opens e-mail attachments, so it spread quickly to thousands of computers worldwide. The original BadTrans dropped a Trojan named Keylog, which attempts to send details about your operating system and personal passwords back to the Trojan author. The recent BadTrans.B worm also carried a Trojan. #Years used runonly applescripts avoid detection windowsUsers of Windows NT, 2000, and XP recently discovered that the MyParty worm carried the Msstask Trojan, which allowed their PCs to be controlled remotely via the Internet. ![]() WORMS ARE STILL the most popular way for Trojans to spread. New Trojans that are able to log all your keystrokes or lay the groundwork for a distributed denial-of-service attack are just a click away-I found Trojan-creation programs available on several script kiddie sites. The Simovits Consulting site offers a detailed list of ports currently being exploited by known Trojans. Plus, it's easy to find a port to target. Why hack a Unix or Solaris system hiding behind a firewall or Intrusion Detection Systems (IDS), when there are thousands of home users running Windows without protection? Script kiddies are bored with hacking government sites. Two reasons I think Trojan horses will take off in 2002: boredom and ease. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |