Computer Crime Research Center

virus/worms.jpg

Dangerous virus attacks

Date: April 01, 2006
Source: theitshield.com


A dangerous Trojan spying on your computer while connecting to a remote attacker is a threat big enough, in itself. What if the same malice has peer-to-peer creeping ability too?!

Security experts at MicroWorld Technologies inform that ‘Trojan.Win32.Inject.t’ or ‘W32/Inject-H’ is a new peer-to peer worm with IRC backdoor Trojan capacities. ‘Inject.t’ can run in the background of a computer by working as a Server that allows a hacker to control the system via IRC channels.

Exploiting Windows vulnerabilities, this worm will proliferate in networks. First it copies itself into a shared folder on the local machine. From there, the P2P network takes over to contact other computers in the network and helps them download and execute the infected file.

MicroWorld experts observe that it even mimics network protocol of specific file-sharing networks by responding to file requests and distributes the infected component across the network.

“This one can get quiet nasty if an attacker is eying the business critical information of an enterprise. Through a single point, this Trojan spreads wide and fast to other computers to expose the total network to a hacker. Sitting in remote place, the hacker has your enterprise at his finger tips,” explains Govind Rammurthy, CEO, MicroWorld Technologies.
Original article



Add comment  Email to a Friend

Discussion is closed - view comments archieve
2010-04-19 08:05:54 - bonjour Kevin
Total 1 comments
Copyright © 2001-2013 Computer Crime Research Center
CCRC logo