вирус trojan download - Статьи


Recent attacks on Google exploited previously unknown hole in IE
According to an initial  analysis by anti-virus vendor McAfee, the recent Chinese attacks on Google and other US companies probably exploited a previously unknown hole in Internet Explorer. Versions 6, 7 and 8 of the browser contain the hole which can be exploited to inject and execute code on Windows computers via specially crafted web pages. The attackers apparently used the flaw to inject a trojan downloader into compromised computers. The downloader then proceeded to retrieve further modules, including a back door that gave the attackers remote access to the computer, from a server via an SSL-encrypted connection. Links to the crafted web pages were likely sent in emails to selected employees of the targeted firms.

Having evaluated the data collected during malware analysis, McAfee believes that the authors used the code name "Aurora" for the attack that targeted Google, Adobe and dozens of other US companies probably including Yahoo, Symantec, Juniper Networks, Northrop Grumman and Dow Chemical. Aurora appears in the path names included in the malware binaries. The initial speculation was that specially crafted PDF files were used for the targeted attacks – in the past two years, PDFs have been a popular choice for attacks originating in China. The most recent campaign of a similar scale (Ghostnet) was discovered when foreign governments were attacked in March 2009.



trojan-downloader.win32.agent (ZLOB) Virus removal


вирус trojan download - Новости


China logs in to hack PMO: NSA
China logs in to hack PMO: NSA He said the attack was in the form of an e-mail with a PDF attachment containing a “Trojan” virus that allows hacker to access a computer remotely and

Recent attacks on Google exploited previously unknown hole in IE
The attackers apparently used the flaw to inject a trojan downloader into compromised computers. The downloader then proceeded to retrieve further modules

DIY cybercrime kits power growth in Net phishing attacks
Most kits can be easily upgraded to customize phishing messages or bypass anti-virus defenses. Purchasing the latest kits requires spending time in Web

Mac security: What you can ignore
The terms virus, worm, and Trojan horse differentiate malware based on how it infects your computer. The term botnet refers to what the software does once

Internet safety tips for parents
Viruses, worms, and Trojan horses can be activated by unsuspecting e-mail users opening infected attachments to e-mail messages. Viruses can “spoof” the

Разновидности троянов - Популярные ресурсы


F-Secure Computer Virus Information Pages: Skulls.A
However when trying to install Skulls trojan on Nokia 9500, user will get a ... 5. Download and install F-Secure Mobile Anti-Virus to remove any Cabirs dropped ...

Encyclopedia entry: Backdoor:Win32/Sdbot.gen!A - Learn more ...
Microsoft Malware Protection Center. Search the malware encyclopedia. ... you will see a notification balloon when new downloads are available to install. ...

Computer Virus - Wikipedia
Definition, history, methods to avoid detection, software, and other resources about computer viruses.

Virus Medicine
Virus Trojan and virus horse are the common virus attacking computers now a days. ... of your computer using these types of Trojan or Trojan horse viruses. ...

Trojan Redirector Ups the Ante in Online Banking Attacks ...
A banking Trojan mutant uses DNS redirection techniques to dodge server shutdowns and hijack online banking user names and passwords.



Поиск: