Warning about a new phishing trojan line
Security experts have discovered a new trojan using a different communication procedure than other types of malware to send data to avoid detection.
The "unnamed" trojan sends stolen information back to spreaders through ICMP (Internet Control Message Protocol) procedures instead of email or HTTP procedures like other types of malware.
After successfully infecting the system, the trojan will impersonate an Internet Explorer Browser Helper Object (BHO) object and wait to steal the user's sensitive information when they enter the forms on the forms. webpage.
Warning about a new phishing trojan line Picture 1 And instead of sending data through an email path or HTTP POST, the trojan encodes the stolen data and uses a simple XOR algorithm before putting the data into the PING ICMP datagram session. to send.
In the eyes of network administrators and data filtering devices, ICMP packets appear to be legitimate packets. However, it is in fact that the personal information of the user is encrypted. Trojans will take those packets and decrypt them from a remote server. They will get what they want.
This is the first type of trojan to use this procedure to send data. It is a proof that malicious software is becoming more and more dangerous.
Hoang Dung
You should read it
- Trojans steal 100,000 personally identifiable information
- Use Wireshark to analyze data packets in the network
- Data analysis with Network Monitor
- Carefully stolen information with Trojan - How to disable Trojan
- Microsoft warned the Emotet trojan back on a large scale, stealing the victim's banking information
- Azorult Trojan steals user passwords while running in the background like Google Update
- Risks from malware and how to prevent it
- What is a Trojan? How to avoid trojan attack?
- Facebook Ads Manager becomes a victim of Trojan information theft
- Description of Trojan-Banker.Win32.Banz.cri template
- A fake trojan appears Microsoft Word
- Trojan 'Pirates of the Caribbean'