Trojans stealing self-destruct appear
Hackers have just launched a new type of trojan targeting hackers to steal bank account information.
The Briz-F trojan is considered a very complex type of trojan that is 'implanted' into sites that spread pornographic images or take advantage of vulnerabilities in software to launch a complex attack. pretty high on PC systems that make mistakes.
Although the main feature of the Briz-F trojan attack is 'drive-by download', allowing the trojan to download malicious code onto the victim's system via peer-to-peer file sharing, the Internet .
The Briz-F trojan operation is relatively complicated. Many of the trojan files installed on the infected system are capable of destroying themselves when they are done, making it difficult to identify the attack. Some files also have the ability to disable security software.
The ieschedule.exe file is responsible for sending information on the infected system such as name, IP address, location . to a predetermined address of the attacker. Meanwhile, this malware also downloads other files - for example, the ieredir.exe file has the ability to transfer the access address of any online service, especially banking services. online, about a fake website. Malware also has the ability to crawl Windows Protected Storage or software such as Outlook, Eudora and The Bat to send back to the attacker.
Security firm Panda Software said the emergence of the attack was the result of online scams and business distribution that allowed editing of the Trojan horse.
Luis Corrons, director of PandaLabs, confirmed the feature of the trojan Briz showed that the author of online scams decided to switch to the goal of profit from tweaking trojans, setting up a system allow buying and selling malware.
Hoang Dung
- Stealing bank accounts with Trojans
- Getting this 5 tricks will ensure you don't worry about stealing your wallet or money
- Stealing addiction syndrome
- Trojan, threat of financial security
- 4 most horrific robberies of all time
- Why was the month of December called the root of the month?
- The locations of viruses and trojans hiding during the boot process
- Bio-plastic bags are able to self-destruct quickly
- Surprisingly, the way of fighting against grave robbery of the ancient people
- 70% toxic use for stealing purposes
- Phishing 'outwits' viruses and trojans
- Serious snake