Trojan, threat of financial security

Technology criminals will be online with you in transactions to steal money. The warning of experts on a new situation worrisome in financial transaction security. Trojans stealing accounts are operating very violently. This software will hide & igr

Trojan, threat of financial security Picture 1Trojan, threat of financial security Picture 1

Photo: Fotosearch

Technology criminals will be online with you in transactions to steal money. The warning of experts on a new situation worrisome in financial transaction security.

Trojans stealing accounts are operating very violently. This software will hide yourself on your computer as soon as you open an e-mail attachment or visit a malicious website. However, instead of being "acknowledged" by increasingly rigorous control and authentication regimes, technology criminals tend to change their operational strategies.

Alex Shipp, senior veteran of anti-virus technology from MessageLabs, spoke at a discussion at the RSA 2006 conference (16-2): ' We see a shift from robbery. Your account and password. New types of Trojans will wait until the victim, ie you, has logged in to your bank account completely, then transfer money out.

Therefore, all the authentication measures, the arts of image coding, biometrics are no longer a big problem for them. Bad guys just wait for you to finish logging in and can attack . "

This new Trojan is on the brink of growing, currently ranked third in MessageLabs's list of permanent dangers. Leading the list is remote control with malicious codes, turning a computer or a computer network into Zombie PCs (computers are controlled and controlled remotely by hackers, becoming the broadcasting center). Spread spam, ads or attack other computers).

Second place is scams that take the user's financial account, often called phising scams, like anonymously your banking website, your relatives .

The drawback of this new type of Trojan is that it only works specifically with a certain bank account. However, the bank list is getting more and more.

The types of Trojans in this group often infect machines via email paths, with links that look at first glance seem harmless, for example an online card, even a promotional word that is charitable. However, if you accidentally "touch" it, immediately, a malicious program has silently installed on your computer and is not active until you access it to the bank.

The development of attack patterns is a huge challenge for customers, even with security experts like Boeing's Jeanette Jarvis. He said that since 2002, Boeing has witnessed a 110-fold increase in the amount of malicious code they block at the gateway to their network. Mr. Javis said: "As soon as we had a strategy against it, they had a new plan and attack method."

In the past, hackers and virus writers were primarily for the purpose of reputation or scandal, and today, financial goals are top. Professional criminals also found that it would be safer to attack online than to rob a bank by passing steel walls and weapons guns.

Mr. David Perry, Trend Micro's global director of education, said that the industry must aim to find a solution to prevent customers' risk of " reducing confidence in Internet ", otherwise the Internet will not There are some implications for the current e-commerce.

TRAN HUY

5 ★ | 1 Vote