Arrest the trojan boss 'Pinch'

The director of the Russian Federal Security Bureau Nikolay Patrushev said that the authors of thousands of "Pinch" trojans have caused huge financial losses over the years.

According to Nikolay, the author of the trojan is Ermishkin and Farkhutdinov. However, he did not specify the identities of these two people. According to Nikolay, Russia will soon prosecute Ermishkin and Farkhutdinov.

According to a blog post from Kaspersky Lab - specializing in computer safety in Russia, the two men will be prosecuted for the same crime as Sven Jaschan (German) who was prosecuted in 2005 for creating NetSky and Sasser worms. Destroy thousands of computers worldwide.

With Pinch, " it's hard to estimate the financial losses caused by it over the years ," Kaspersky said.

Pinch sellers can also adjust the program according to the buyers' wishes and support by illustrating the tools used to break the device, Kaspersky said.

4000,000 copies of Pinch sold in "black market"

Picture 1 of Arrest the trojan boss 'Pinch' Thousands of Pinch versions in Russian and English have been sold on the Internet. Kaspersky said the security software has detected 4,000 different versions of Pinch with the same basic code but has been modified to not be detected by network security software.

According to F-Secure, Pinch has a well-developed user interface and can be used to classify the information they have stolen. A key feature of Pinch allows an attacker to specify the type of data the trojan will steal and the ability to encrypt the data when it sends stolen information back to the owner so no one can read it. When the computer is infected with the Trojan created by Pinch, the hacker will exploit a lot of information on the victim's computer.

According to Panda Security, a network security company, the stolen information could be encrypted before being sent back to hackers.

Pinch can also be customized to the point of purchase and make infected computers entered into a botnet, a computer network set up to hide the activity of hackers. Botnets are often used to send spam or to perform other computer attacks.

Tam Ha