No Way to Spam - Search Tool

Thursday, March 20, 2008

Trojan

If you were coming from AdSensonia Group then here are the details:

Well the tech guy sent Trojan with the following descriptions:

Malware Information: Trojan-Spy
Name : Trojan-Spy
Alias: Trojan-PSW, Spy, TrojanSpy, PSW, Password Stealing Trojan, Spying trojan, Trojan.PSW
Type: Trojan-Spy, Trojan-PSW
Category: Malware
Platform: W32

What are all this about?

Spy, Data or Password Stealing Trojan (Generic Description)

A spy, data or password stealing trojan is usually a standalone program that allows a hacker to monitor user's activities on an infected computer. Password stealing trojans are quite popular. Some backdoors and worms drop password stealing trojans to a system they try to infect.

A password stealing trojan is usually a standalone application that installs itself to system and sometimes drops a keylogging component. Such trojan stays active in Windows memory and starts keylogging (recording keystrokes) when a user is asked to input a login and a password. Then a trojan stores the recorded keystrokes data for later submission or sends this data to a hacker immediately. In many cases such trojans also send information about user's computer IP, RAS (remote access server), and network configuration. A hacker who gets this info is capable of misusing other person's Internet account and in some cases hack into user's network. Stolen logins and passwords can allow a hacker to read user's e-mail on public and corporate mail servers.

A data stealing trojan is usually a standalone program that searches for specific files or data on an infected computer and
then sends this data to a hacker. For example some data stealing trojans try to locate 'key' files that contain authentication
information for some program or service. Other data stealing trojans try to steal serial numbers of software installed on an
infected system. A few e-mail worms attach random data files (excel or word files, images) to e-mails that they send from
infected systems.

A spy is usually a standalone program that installs itself to system and records certain events on an infected computer. For
example such trojan can record keyboard activities, keep the list of applications that a user ran, archive URLs that a user opened and so on. A spying trojan sends out a recorded log to a hacker at certain intervals. In some cases spying trojans have a certain time window. For example they work only until a certain date and then uninstall themselves from a system.

Most famous spies, data and password stealing trojans: Coced, Hooker, GOP, Kuang, Platan, Klogger.

Thanks my security agent!

1 comment:

Anonymous said...

A message about HSBC bank carried also this Trojan. My Radar has captured it and transmitted it to the analysing bank to track Internet bad behaviours, as I understood. Thanks to the Internet-guards. Seems funny, you think?

Anti Spam Followers! Say NO to Spam! Join the NO!

Fujitsu Computer Systems Corporation

Bookmarks

Add to Netvibes StumbleUpon Stumbleupon It AddThis Social Bookmark Button
Add2Netvouz

Feeds

12/09Dec 9, Love has Unlimited Definition! It Is Natural Tender Affecti...
Love is tender affection. But, it's broad, despite this definition. It's a natural...
11/03Nov 3, About Me, Reveals How to convert a Passion Into a Web Busin...
Through this story About Me, I reveal how I converted my passion, lifetime experie...
04/11Apr 11, The Ezine Acts Bookshop Exhibits My Own Books & Some Useful...
My books on the Ezine Acts Bookshop & some other useful books by titles and author...
04/10Apr 10, Arabic Poems to Enjoy Reading on Posters on Your Walls at H...
Couplets of Arabic poems in some artworks to enjoy reading poetry in Arabic langua...
04/10Apr 10, The HOME BIZ TRENDS Meditation Covers You to Make Your Pass...
The HOME BIZ TRENDS website offers three meditation services in business, love and...
04/28Apr 28, Is "How to Monetize Your Content" Your Question?
You can't monetize anything before you build a narrow niche as an start business o...
08/30Aug 30, Phoenix Order Page
Phoenix Order! I published my poetry book and it is now in Cairo. The second editi...
08/29Aug 29, Wakening of the Phoenix Versus Rising of the Phoenix, Which...
Wakening of the Phoenix, or Rising of the Phoenix? Could YOU help me determine whi...
08/28Aug 28, ARABIC PHOENIX POETRY! Arabic Poetry Web Page to Read & ord...
ARABIC PHOENIX POETRY web page for Arabic reading and ordering "Rising of the Phoe...
05/17May 17, How to Ping and RSS?
How to use the ping and rss tips to really simple syndicate (RSS) and ping your we...