LOOT MONEY WITHIN A MONTH

Hello All, I want to tell you about a great site I found. They pay me to read e-mail, visit web sites and much more. It's free to join and easy to sign up! CLICK THIS LINK TO VISIT cashmails.biz

The proliferation of malware(Virus, worms, trojan horse, logic bomb etc) in recent years has presented a serious security threat to enterprises, organizations, and individuals due to its inherent capability of causing devastative damage on the cyber infrastructure. This blog is for those who are interested to discuss / share / know about malware, how they works (technical details), how to design malware detection engine, current trends in anti-virus research etc

Saturday, May 31, 2008

New Trojan specializing in bank accounts to steal millions of dollars

December 15, according to foreign reports, the Trojans are becoming more advanced, more professional, more destructive. The latest discovery called "Prg Trojan" the bank Trojans successfully on a global scale theft of a commercial bank customers millions of dollars.
SecureWorksSecureWorks senior security researcher Don Jackson said it would be some senior bank fraud procedures, these procedures I am shocked by the level. JacksonIn June this year, Jackson found that the Trojans had a prototype. However, these Trojans are now forward the development. This is a middleman attack, the identification can be attacked. The Trojans will take a user through all of the steps.
Security experts, and other forms of "Prg Trojan" Trojan different, this new variant of the malicious software is a specialized implementation of bank fraud crimes. This Trojan horse program has emerged for some time. Attackers are debugging the process, in order to do a better job of this process.
Hackers are rushing to the use of the new malicious software attacks on the United States, Britain, Spain and Italy's 20 major banks. Researchers have determined that such banks Trojan variant of the Russian hacker organization UpLevel Germany and the design of relevant personnel. These hackers in Moscow and Mumbai Data Center attacks.
the user's computer was "prg Trojan" Trojan infection, the Trojans will be able to mock the victims of the online banking operations and these data transmission to the control of this process hackersThis Trojan horse of the victims began to conduct banking transactions when reminded hackers, let hackers hijack victims of the communication process, the victims do not have to visit the user name or password can take away the money in the accounts of victims.
. This special variant of the Trojans closed the theft of information that part of activities. Since it closed, we can not see it on the network communications.
This Trojan is also able to simulate percussion keyboard and all the banks in order to visit the website of the bank to avoid the police anti-fraud measures. Security experts predicted that as more and more senior anti-spam technology, the future of this variant of the Trojan program will be mainly based on the networkAttackers will find more advanced ways to install malicious software.

No comments:

BE FAST ACESS AND EARN