Trojans stealing self-destruct appear
The Briz-F trojan is considered a very complex type of trojan that is 'implanted' into sites that spread pornographic images or take advantage of vulnerabilities in software to launch a complex attack. quite high on PC systems l
Hackers have just launched a new type of trojan targeting hackers to steal bank account information.
The Briz-F trojan is considered a very complex type of trojan that is 'implanted' into sites that spread pornographic images or take advantage of vulnerabilities in software to launch a complex attack. quite high on PC systems that make mistakes.
Although the main feature of the Briz-F trojan attack is 'drive-by download', allowing the trojan to download malicious code onto the victim's system via peer-to-peer file sharing, the Internet .
The Briz-F trojan operation is relatively complicated. Many of the trojan files installed on the infected system are capable of destroying themselves when they are done, making it difficult to identify the attack. Some files also have the ability to disable security software.
The ieschedule.exe file is responsible for sending information on the infected system such as name, IP address, location . to a predetermined address of the attacker. Meanwhile, this malware also downloads other files - for example, the ieredir.exe file has the ability to transfer the access address of any online service, especially banking services. online, about a fake website. Malware also has the ability to crawl Windows Protected Storage or software such as Outlook, Eudora and The Bat to send back to the attacker.
Security firm Panda Software said the arrival of the attack was the result of online scams and business distributions that allowed the trojan to be edited.
Luis Corrons, director of PandaLabs, confirmed the feature of the trojan Briz showed that the author of online scams decided to switch to the goal of making a profit from tweaking trojans, setting up a system allow buying and selling malware.
Hoang Dung
You should read it
- The intense revival of Briz Trojan
- What is a Trojan? How to avoid trojan attack?
- Source code for creating dangerous trojans are on sale!
- How to prevent RAT attacks and take control of PC
- Again Trojan appeared to attack Mac OS
- Smartphone was attacked by ZeuS Trojan virus
- The 5 most 'dirty' tricks of malware
- Appeared trojan trojan antivirus tool for mobile
- McAfee spoofing spam to distribute trojans
- SonicWall launches anti-malware software
- Azorult Trojan steals user passwords while running in the background like Google Update
- Attack analysis uses Excel 4.0 macros to disguise