Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Hackers Use Construction Kit To Create Trojan

According to the news reported by Computerworld on June 25, 2007 many gangs of hackers are using 'construction kit', supplied by Trojan horse authors. The 'construction kit' is used to create and set free many kinds of harmful malware.

The latest Trojan, Prg Trojan is another kind of wnspoem Trojan found in October last year (2006). Like wnspoem, Prg Trojan is used for stealing private data from the internal memory buffer of Windows before coding the data and forwarded to SSL (Secure Sockets Layer) protected websites.

As per the news reported by Computerworld on June 25, 2007, Jackson said that the Trojan sold the pilfered data to several servers worldwide and was stored in code language. From there it is transferred to those who search for this kind of information. A study of the log-files stored on servers that have the filched data reveals that the maximum information comes from Corporate PCs.

The Prg Trojan exploited data comprising of information like username, passwords, online payment account, credit card account number, Social Security numbers, and credit union account numbers.

As per the news reported by Secureworks.com on June 25, 2007, the Prg Trojan is very dangerous in terms of its method, and it hides itself from anti-virus software and the attackers behind it keeps on creating different kinds of Trojan.

According to the news by Computerworld on June 25, 2007, Jackson explains this as an ongoing process. The hackers continue to attack with one specific variant and once that type of Trojan is caught by anti-virus, the hackers again come up with a new virus.

As per Secure works, a hacker group that uses the 'construction kit' name its attacks after the famous cars viz. Mercedes, Ford, Bugatti.

Secure works says, the hacker group is spreading various types of Trojan horses by exploiting the flaw in the ADODB database-wrapper library and other parts of Internet Explorer and Windows. Further, this group alone has extracted information from no less than 8,000 users.

The information that the trojans of this group have stolen is transferred to servers in US and China. Previously, the group had also stolen confidential data of almost 100,000 users and sent it to fraud servers in US, China and Russia.

Related article: Hackers Redirect Windows Live Search to Malicious Sites

» SPAMfighter News - 7/6/2007

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next