Shark 2 Creates Dangerous Trojans
The Shark 2 tool creates trojans that can steal bank passwords, record keystrokes, or download malicious files. With it, cyber0-crooks can also seize images by using users' Web cams to watch their movements at home.
PandaLabs has uncovered this tool, which is available from many Internet forums. It has various versions such as 2.1, 2.2, and 2.3.2 on the Web.
The trojans designed with Shark 2 are capable of capturing information like the computer's processor, various programs, and bank passwords. With this malware, cyber-crooks can turn on users' Web cams and observe everything they do. This offense is another development in cyber crime and seriously invades privacy, said Luis Corrons, technical director of PandaLabs. Homenestor published this in news on August 10, 2007.
The program's greatest threat is that it helps to write every type of malicious code even by a novice by selecting the desired features of the malware.
These features consist marking out the server for a particular malware, configuring options for a code that would run on system restart, or displaying errors. The program also allows malicious users to commandeer specific behavior for services and processes, for e.g., shutting down the user server, or terminating services.
Shark 2 lets malware take up the UPX package and to be configured to halt its own processes in case of debugging or appearance of VMware making detection very hard. Once the computer is infected with the malware, it joins with the server that has been previously specified and shows up an interface through which a number of malicious actions are possible.
When the malware is created, it shows the infected system's data, such as the processor, RAM, browser, anti-virus installed etc. Shark 2 then helps to run various utilities on the hijacked computer. With this, the cyber-criminals can edit the host file or modify the registry following which, the hackers can lead users to infected pages or phishing sites.
Similarly, with Shark 2, the hackers could instruct the Trojan to capture passwords of e-mail, IM, online banks etc., collect data on programs installed, set up new connections, or activate services and processes.
Related article: Surge in Spam attack
» SPAMfighter News - 22-08-2007
We are happy to see you are reading our IT Security News.