[G3]-Technews
[G3]-TechNews : Home| RSS | Atom | MSN | WAP

 Stickies:
Article: Step-by-Step Guide: How to set up a VPN
Article: Download: Microsoft Monad (Beta)
Article: Building a 64-Bit Multimedia Workstation
Article: Coming Soon to Windows: The Microsoft Shell (MSH)
Article: How to Reset Win NT / 2000 / XP Administrator Password
Article: The Technology Behind Dual Core CPUs
Article: How-To: Wireless Network Security
Article: Article: PCI Express - technology backgrounder
Article: Tutorial: Access Hidden Files on Your iPod
Article: Troubleshooting drivers with XP's hidden Driver Verifier Manager
Article: How to Make a 5 in 1 Network Cable
Article: Comparison - Blu-ray & HD DVD
Article: Beginners Guides Linux : Part 1 | Part 2 | Part 3
Article: How To Crack WEP (Wired Equivalent Privacy)
Article: Email Addresses Spoofing.
Link: Free PHP ebook
Link: FREE ASP.NET books and eLearning course
Link: Free registration code for Opera 8.
Invitations: Gazzag (Here) | Yahoo! 360 (Here)  | Orkut (Here)

Hybrid Worm Wave Of The Future
Contributed by: G3nu1n3, at 5/30/2005 08:26:00 AM.

A new worm that hit users this week is a perfect example of the future of malicious code, said Panda Software Friday. And that future looks ominous.

The worm, dubbed "Eyeveg.d" by Panda (but Bugbear.b by Sophos, Lanieca.b by Symantec) is a sophisticated hybrid that spreads like a worm but conducts Trojan-style actions against the compromised computer.

Eyeveg.d infects a PC using an .exe file, a typical tactic of worms, and spreads itself to other machines by hijacking e-mail addresses and mailing itself to others.

The second, Trojan horse, component kicks in next, as Eyeveg.d loads a .dll file as a plug-in to the Internet Explorer browser. The .dll, essentially a keylogger, captures keystrokes whenever the computer's user sends data to an SSL server, such as those used by banking and e-commerce sites.

"This is just another example of phishing, through which Eyeveg.d can gather data such as bank account numbers, passwords, or credit card numbers," said Panda.

The Trojan also includes a backdoor, through which the hacker can send new commands or install more malicious software on the system.

"This type of hybrid of two malware species is becoming more and more habitual, as malware creators look for increased capacities and versatility in their creations," concluded Panda.

Source: Link


Important:
To Read MOST UPDATED News Items browse to HOME page.

0 Comments:

Post a Comment

<< Home



[G3]-TechNews : Home| RSS | Atom | MSN | WAP


Archives :

- Monthly Archives :


- Post Count: 1,783 before June 1, 2005. (Since: October 26, 2004)