SMS becomes a trojan spread tool

Hackers are using text messages via mobile phones to entice users to access a malicious website to build "zombie" networks.

This is the content of the warning message that security firm Websense has just released.

Websense said the security attack uses "social engineering" techniques to entice people to access a dangerous website. An SMS text message is sent to the mobile phone of the user thanking them for registering to use a "virtual" service. The message said it would automatically charge $ 2 a day for the service. This fee will be charged directly to the phone bill. The service can only be stopped when users announce to stop using the "virtual" service through a website.

SMS messages with similar content are also repeatedly sent to a variety of online forums online, security firm Websense warns.

The attack began on Thursday last week in the US and was first discovered by security firm Sunbelt Software.

Once users access the website mentioned in SMS to stop using the service, they will be "encouraged" to download a trojan. Not only that, the attacker also gives detailed instructions on how to bypass security alerts in Internet Explorer.

SMS becomes a trojan spread tool Picture 1 After Websense named "Dumador" - installed, it turned the victim's PC system into a "zombie" that allowed an attacker to control the system remotely. This PC will become part of the "bot" network that serves attacks online.

" This is the first time we've seen this kind of attack ," said Ross Paul, Websense's senior product manager. " Basically, this attack uses" social engineering "techniques so it has tricked many victims. "

Security firm Websense said the company is currently monitoring the attack but has yet to discover the attacker.

" In general, these attacks are often organized by a group of people. In some cases we know their nicknames. But in some cases it is not ," Paul said.

Websense cannot statistically determine how many people have become victims of this attack. Monitoring the performance of "botnet" networks is a difficult task because this network can be located in many different countries.

Dumador trojan allows an attacker to use the HTTP protocol to control controlled PC systems or trick victims into uploading personal information. The most popular form of "bot" control is through Internet Relay Chat (IRC) channels.

The emergence of new attacks via SMS has proven a new trend in hackers. They are not from any means to attack the victims in order to bring them illegal profits. Trojans, worms, viruses or malware are no longer a way to prove their ability or become as popular as they were in the past. They have become an instrument of real profit. This is a prominent trend of cyber criminals today.

Hoang Dung

5 ★ | 1 Vote

May be interested

  • The Trojan couple increases spam spread ratesThe Trojan couple increases spam spread rates
    the total amount of spam e-mail spread in the first three quarters of the year increased sharply. the reason is that two trojans download maliciously, using a form of pc attack and then use them to spread huge amounts of e-mail.
  • Neprodoor trojan warning appears in VietnamNeprodoor trojan warning appears in Vietnam
    users of domestic computers have been warned about a new type of dangerous trojan named neprodoor originating from russia, which has appeared and spread on computers in vietnam.
  • Trojan 'Pirates of the Caribbean'Trojan 'Pirates of the Caribbean'
    a fake garbage campaign provides information about the new 'pirates of the caribbean' movie to spread a newly launched trojan. in terms of content, the above spam messages are full of information and a fake malicious link brings c
  • What is Trojan? How to avoid Trojan horse virusWhat is Trojan? How to avoid Trojan horse virus
    a trojan or trojan horse is a type of malicious code or software that can take control of a user's computer remotely.
  • What is Trojan Dropper?What is Trojan Dropper?
    one particular program used by cyber criminals in their illegal transactions is the trojan dropper program. so how does this happen and how can you prevent it?
  • Trojans appear to take advantage of bird flu to infectTrojans appear to take advantage of bird flu to infect
    virus creation experts always take advantage of hot news events to make the opportunity to spread malicious code. the trojan called naiva.a is currently infected in the form of an attachment in e-mails with content g
  • McAfee spoofing spam to distribute trojansMcAfee spoofing spam to distribute trojans
    security experts say they have stopped a new spam attack in order to spread a dangerous trojan that steals passwords.
  • Again Trojan appeared to attack Mac OSAgain Trojan appeared to attack Mac OS
    securemac, in a security warning message last week, said the applescript.tht trojan was released through a number of malicious websites.
  • Can Trojans self-replicate?Can Trojans self-replicate?
    trojans are one of the most insidious forms of malware that threaten our devices. they operate stealthily, often disguised as legitimate software or files, and cause huge damage.
  • The fake Trojan add-on Trojan is extremely dangerousThe fake Trojan add-on Trojan is extremely dangerous
    security firm mcafee yesterday discovered a fake trojan as an add-on for the firefox browser to break into users' systems.