SME Times is powered by   
Search News
Just in:   • Tier 2 and 3 Indian cities to emerge as pivotal real estate growth hubs in 2025  • India’s Jaduguda Mines discovery extends uranium resources by over 50 years: Govt  • Australia 'excited to play' at inaugural Kho Kho World Cup   • Indian startup ecosystem raises over Rs 29,200 crore in 2024, witnesses record 13 IPOs  • K’taka govt employee digitally arrested for six hours, robbed of Rs 19 lakh 
Last updated: 27 Sep, 2014  

Cyber.Crime.9.Thmb.jpg Cybercriminals put a new spin on old threats

Cyber Crime generic
   Top Stories
» Indian startup ecosystem raises over Rs 29,200 crore in 2024, witnesses record 13 IPOs
» Govt reforms, private partnerships behind Indian space industry growth in 2024: ISpA
» Indian firms raise bumper funds from equity market in 2024, set new records
» Centre-sponsored 10 plastic parks poised to spur exports, create more jobs
» India’s data centre capacity to more than double by 2027
PR Newswire | 31 Jul, 2010

BOULDER: A disturbing Internet security trend is putting home PC users' identities at risk. Phishing Trojans, a kind of Internet security threat designed to steal your personal information and wreak other havoc on your PC, have been taking on new forms. In some cases, cybercriminals use them for "phishing" your log-in credentials and other sensitive information. In other cases, they're triggering phony antivirus programs to appear on your PC and trick you into giving away your credit card number in exchange for a solution you never receive.

Internet security experts at Boulder, Colorado-based Internet security service company Webroot have also identified malicious programs that leave your PC unusable after infection: Victims either cannot reboot their PCs once the data theft is complete, or their PCs crash when they attempt to remove the malware.

"In some cases, the crashes were the result of poor coding by the malware author," says Andrew Brandt, Lead Threat Research Analyst at Webroot. "But increasingly, it appears that this behavior is deliberate and occurs without warning. This unfortunate trend appears to be getting worse, leaving a raft of perplexed, angry victims unable to use their computers in the wake of an infection."

Home PC users with a taste for the more technical details of phishing Trojans will appreciate the following documentation of recent examples:

  • Zbot. Many phishing Trojans turn an infected computer into part of a botnet, a zombie army of Internet-connected computers that are controlled remotely and unbeknownst to their owners. Botnets can send spam, spread malware to other computers, engage in distributed denial-of-service attacks, serve as covert file storage areas and a host of other undesirable activities. It is speculated that new variants of Zbot may deliberately disable the PC as a distraction, making it more difficult for the victim to become aware that credentials were stolen and used until it is too late.
  • Tacticlol. This phishing Trojan arrives in email inboxes disguised as either UPS shipping information or some sort of Facebook account update. It typically downloads at least one rogue antivirus program when a victim unzips the attachment and runs the file. One of the rogues used in a recent infection is called XP Defender. The rogue itself disables common browsers, Outlook Express and other Internet-enabled applications, among other things.

To learn more about protection from phishing or how antivirus and antispyware programs from Webroot can protect you, visit http://www.webroot.com/En_US/consumer.html.

SOURCE Webroot

 
Print the Page Add to Favorite
 
Share this on :
 

Please comment on this story:
 
Subject :
Message:
(Maximum 1500 characters)  Characters left 1500
Your name:
 

 
  Customs Exchange Rates
Currency Import Export
US Dollar
84.35
82.60
UK Pound
106.35
102.90
Euro
92.50
89.35
Japanese Yen 55.05 53.40
As on 12 Oct, 2024
  Daily Poll
Will the new MSME credit assessment model simplify financing?
 Yes
 No
 Can't say
  Commented Stories
 
 
About Us  |   Advertise with Us  
  Useful Links  |   Terms and Conditions  |   Disclaimer  |   Contact Us  
Follow Us : Facebook Twitter