Trojans stealing self-destruct appear

The Briz-F trojan is considered a very complex type of trojan that is 'implanted' into sites that spread pornographic images or take advantage of vulnerabilities in software to launch a complex attack. quite high on PC systems l

Hackers have just launched a new type of trojan targeting hackers to steal bank account information.

Trojans stealing self-destruct appear Picture 1Trojans stealing self-destruct appear Picture 1 The Briz-F trojan is considered a very complex type of trojan that is 'implanted' into sites that spread pornographic images or take advantage of vulnerabilities in software to launch a complex attack. quite high on PC systems that make mistakes.

Although the main feature of the Briz-F trojan attack is 'drive-by download', allowing the trojan to download malicious code onto the victim's system via peer-to-peer file sharing, the Internet .

The Briz-F trojan operation is relatively complicated. Many of the trojan files installed on the infected system are capable of destroying themselves when they are done, making it difficult to identify the attack. Some files also have the ability to disable security software.

The ieschedule.exe file is responsible for sending information on the infected system such as name, IP address, location . to a predetermined address of the attacker. Meanwhile, this malware also downloads other files - for example, the ieredir.exe file has the ability to transfer the access address of any online service, especially banking services. online, about a fake website. Malware also has the ability to crawl Windows Protected Storage or software such as Outlook, Eudora and The Bat to send back to the attacker.

Security firm Panda Software said the arrival of the attack was the result of online scams and business distributions that allowed the trojan to be edited.

Luis Corrons, director of PandaLabs, confirmed the feature of the trojan Briz showed that the author of online scams decided to switch to the goal of making a profit from tweaking trojans, setting up a system allow buying and selling malware.

Hoang Dung

4 ★ | 2 Vote