SME Times is powered by   
Search News
Just in:   • Biden administration forgives $4.7 billion loans to Ukraine  • Women entrepreneurs driving innovation, growth in gem & jewellery sector: Smriti Irani  • India’s export outlook brighter as manufactured goods gain share: RBI  • India’s consumer durable makers to log 11-12 pc growth in FY25  • SEBI’s proposal on SME IPOs: striking a delicate balance 
Last updated: 27 Sep, 2014  

Cyber.Crime.9.Thmb.jpg Cybercriminals put a new spin on old threats

Cyber Crime generic
   Top Stories
» India’s export outlook brighter as manufactured goods gain share: RBI
» Private consumption driving growth in Q3 with rural India taking lead: RBI
» Indian MSMEs create about 10 crore jobs in 15 months
» Indian prefer Q-commerce for daily essentials, physical stores for high-value buying
» Embedded finance to unlock $25 bn revenue opportunity for India’s platforms by 2030
PR Newswire | 31 Jul, 2010

BOULDER: A disturbing Internet security trend is putting home PC users' identities at risk. Phishing Trojans, a kind of Internet security threat designed to steal your personal information and wreak other havoc on your PC, have been taking on new forms. In some cases, cybercriminals use them for "phishing" your log-in credentials and other sensitive information. In other cases, they're triggering phony antivirus programs to appear on your PC and trick you into giving away your credit card number in exchange for a solution you never receive.

Internet security experts at Boulder, Colorado-based Internet security service company Webroot have also identified malicious programs that leave your PC unusable after infection: Victims either cannot reboot their PCs once the data theft is complete, or their PCs crash when they attempt to remove the malware.

"In some cases, the crashes were the result of poor coding by the malware author," says Andrew Brandt, Lead Threat Research Analyst at Webroot. "But increasingly, it appears that this behavior is deliberate and occurs without warning. This unfortunate trend appears to be getting worse, leaving a raft of perplexed, angry victims unable to use their computers in the wake of an infection."

Home PC users with a taste for the more technical details of phishing Trojans will appreciate the following documentation of recent examples:

  • Zbot. Many phishing Trojans turn an infected computer into part of a botnet, a zombie army of Internet-connected computers that are controlled remotely and unbeknownst to their owners. Botnets can send spam, spread malware to other computers, engage in distributed denial-of-service attacks, serve as covert file storage areas and a host of other undesirable activities. It is speculated that new variants of Zbot may deliberately disable the PC as a distraction, making it more difficult for the victim to become aware that credentials were stolen and used until it is too late.
  • Tacticlol. This phishing Trojan arrives in email inboxes disguised as either UPS shipping information or some sort of Facebook account update. It typically downloads at least one rogue antivirus program when a victim unzips the attachment and runs the file. One of the rogues used in a recent infection is called XP Defender. The rogue itself disables common browsers, Outlook Express and other Internet-enabled applications, among other things.

To learn more about protection from phishing or how antivirus and antispyware programs from Webroot can protect you, visit http://www.webroot.com/En_US/consumer.html.

SOURCE Webroot

 
Print the Page Add to Favorite
 
Share this on :
 

Please comment on this story:
 
Subject :
Message:
(Maximum 1500 characters)  Characters left 1500
Your name:
 

 
  Customs Exchange Rates
Currency Import Export
US Dollar
84.35
82.60
UK Pound
106.35
102.90
Euro
92.50
89.35
Japanese Yen 55.05 53.40
As on 12 Oct, 2024
  Daily Poll
Will the new MSME credit assessment model simplify financing?
 Yes
 No
 Can't say
  Commented Stories
 
 
About Us  |   Advertise with Us  
  Useful Links  |   Terms and Conditions  |   Disclaimer  |   Contact Us  
Follow Us : Facebook Twitter