Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Twin Trojans Use PowerPoint Flaw To Spread

Another commendable feat was exposed during the weekend aimed at error in Microsoft's PowerPoint software, which could permit an intruder to command an infected system and operate random programs.

The latest pair of malevolent programs is employing PowerPoint to circulate, cautioned safety researchers during the weekend, although it's uncertain whether the malware aims to manipulate the latest PowerPoint error. The researcher considers susceptibility to be their latest error, however Microsoft differs.

Invaders could capitalize on the numerous safety gaps in Windows' Help Viewer to shutdown susceptible machines or dispatch malevolent program, German researcher Benjamin Tobias Franz told in a report placed on the BugTraq meeting on how Symantec works. Symantec also brought out an analysis on Franz's discoveries through its DeepSight Threat Management Service, alleging the susceptibilities are activated when the application program manages uniquely fashioned Windows help (.hlp) records.

Subsequent to latest assaults aiming the Windows Server Service error defined in MS06-040, IT security experts are presently conflicting, and cautioning against the fresh, untested errors in Microsoft's operating system, and the various ways of benefiting from it.

Tokyo- stationed antivirus dealer 'Trend Micro Inc.' claimed initially that it obtained specimens in the previous week for a malware called as 'Troj.Mdropper-BH'. On examining the site content, Trend Micro concluded that the Trojan is circulated by a particularly created PowerPoint file transferred directly via the Internet or unloaded on the computers by other malevolent software.

Next an arbitrarily identified .exe file is dumped in Windows temporary database by this Trojan, which also includes another Trojan addressed as Troj.Small-CMZ. Once you operate Troj.Small-CMZ it pauses for an Internet connection. Once the connection is established, it reaches the following URLs to transfer and execute the malevolent files: "http://61.{BLOCKED}8.35/images/link/"and "http://www.th{BLOCKED}st.com.tw/upload".

The system restore should be incapacitated by end users executing Windows ME and XP to permit a thorough scanning of affected computers. People executing other Windows editions must follow the directions and suggestions offered by Microsoft to evade the offensive.

Microsoft's preliminary analysis has disclosed that this is not newfound zero-day fragility. Microsoft is aggressively processing to prove those finds and will offer extra data and client counseling when the analysis is finished.

Related article: Twin phishing E-Mails Pose from Bank of Hanover

ยป SPAMfighter News - 28-08-2006

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next