ILife Trojan is available in pirated Photoshop CS4
The malicious code found in Apple iLife 09 has also been discovered in pirated versions of Adobe Photoshop CS4.
The new version of the malicious code named OSX.Trojan.iServices.B also functions similarly to the first version, taking up administrative rights to open the backdoor on the victim computer. Once occupied, the victim computer will become a "zombie" for hackers to exploit spam, perform denial of service (DDoS) attacks.
The victim is unaware that when installing pirated Photoshop CS4, Trojans will also install themselves into the system. Therefore, installing Photoshop CS4 software and using it continues normally.
As of January 25, more than 5,000 users downloaded pirated versions of Adobe Photoshop CS4 software, according to information from security firm Intego. Users need to be wary of pirated versions shared from peer networks or websites on the Internet.
Hackers visit Monster, get 4.5 million account data
Monster.co.uk's website has been visited by hackers and lost 4.5 million account details data registered members including: name, password, phone number, email address, birthday.
Monster has advised all members to change their password immediately to avoid unauthorized use. Security experts also said that with the amount of detailed information stolen by hackers, they could register for a bank account or credit card online.
Security firm Sophos warned that most users use the same password for many different websites, so when they get the website account password, hackers will be able to search for email accounts or bank accounts.
This is not the first visit to Monster.co.uk, in August 2007, the website was stolen 1.6 million account data after an attack on the database by the virus.
* With the same loss as Monster , the British Council has also lost 2,000 member account information but the reason comes from humans, particularly due to the loss of TNT's CD transport.
Lost information on CD includes: name, salary, insurance information, bank account number . but luckily all the data on the CD is encrypted. However, the CD is transferred via TNT's unsecured service.
You should read it
- What is Trojan Dropper?
- Microsoft: Using Windows 'pirated' risk of data loss will be very high
- Again Trojan appeared to attack Mac OS
- Appeared Trojans spy on businesses
- 49 smart Photoshop tips you need to know (Part 3)
- 49 smart Photoshop tips you need to know (Part 1)
- Instructions for using Photoshop for newbies
- 49 smart Photoshop tips you need to know (Part 2)
May be interested
- W32.Downadup.B outbreaks during the holiday seasonsymantec recommends that users should update the patches immediately to handle the vulnerabilities in remote code execution for microsoft windows server service rpc.
- Trojan-Downloader.Win32.Agent.meethis dangerous program is a trojan. it is a windows pe file. the size of the infected file can range from 70kb to 260kb.
- New variant of 'extremely toxic' virus appearsjust after microsoft awarded the $ 250,000 prize to those who caught the dispersal of the malicious virus 'conficker', a new variant appeared to be more dangerous.
- The fast-paced 'mobile phone virus'virus and spam attacks on mobile phone users are on the rise, security firm mcafee warned.
- The third variant of Conficker appearsnot only is the ability to spread rapidly, conficker.c also has the ability to disable all attacks of the antivirus programs.
- How to destroy and prevent Confickerconficker is a new kind of computer worm that has been around since the beginning of this year but has quickly spread across a wide range of people, making many people 'stand out'. below, please introduce to readers how to detect, prevent and destroy this dangerous computer worm.