Trojans arriving by spam

Two new Trojan horse attacks are currently being sent via an e-mail spam format across the Internet by a hacker who persuades users to install it as a new screen saver, and then uses it to get access to those users' systems.

The BackDoor-G Trojan horse is being distributed like spam e-mail in the guise of a new screensaver, a game update, and other misdirection. Once installed, the program will provide an individual with complete surreptitious access to the client system.

A similar Trojan horse is also currently spreading through France under the name Armageddon, and may spread to the United States as well.

The programs are essentially the same, but use different file names.

"Basically, they just open a hole into enterprises," said Sal Viveros, group marketing manager for Total Virus Defense at Network Associates, which has received several samples of the attack since Wednesday last week. "It's really just a hack tool for hackers to gain entrance to individuals, companies, whatever."

The Trojan horse, when installed, will have the client "ping" an alert to the hacker to inform them of the successful installation of the backdoor program.

Network Associates is still following the electronic trail to the hacker.

"We're still trying to figure out exactly where that [ping] is going," said Viveros. "It doesn't seem to be any specific industry or group is being targeted."

The new Trojan horses are similar to previous attacks that enabled hackers to secretly gain access to a client system, such as BackOrifice and NetBus, as they represent a new mixture of virus and intrusion tools, according to Viveros. The new mixture of technologies now requires security updates to be issued to more than one type of security application.

"We're adding this to our antivirus program, but we're also adding this to CyberCop, our intrusion-detection application, because it really is both," said Viveros. "It's starting to blur the lines between malicious code attack and security vulnerability."

BackDoor-G and Armageddon are also difficult to detect because both can change their file names, and therefore hide from traditional methods of simply deleting suspicious files.

To protect against the risk of vulnerability, you should update both your antivirus and intrusion-detection software, according to Viveros.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Matthew Nelson

PC World
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?