Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43431
  • Total Topics: 16526
  • Online today: 2926
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2921
Total: 2922









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 06. May 2008., 17:50:25 »



If you work in the military and think your email is safe, think again. A rather large scheme has been recently 
detected by security researchers at the Romanian company BitDefender. The company's  head of AV
Research, Sorin Dudea, has declared "It's not every day that you stumble on the workings of an honest-to-God hacking ring, let alone one that has a predilection for using military and university-run mail servers as spam relays."

The new Trojan has been discovered when researchers found a spam email that claimed to contain links to videos. Whenever a user tries to click one of these links, he is prompted to download some sort of "media player" capable of rendering the specific videos. Downloading the application will result in your computer being infected with Backdoor.Edunet.A trojan. This malware is said to use the computers of its victims as a way to send commands to a number of mail servers.

The malware application was specifically designed to send commands to various servers, in hope of finding an open relay. This way, every mail sent by the Trojan application will look like it has been sent from the open relay.

The scheme doesn't seem to be all that complex, as users should be aware that most videos use local software applications or are rendered by the webpage's built-in player. The interesting thing is that the spam servers featured in the Trojan's list are mostly from .edu and .mil domains. The fellows at BitDefender haven't succeeded in finding out what is the connection between the targeted servers.

After discovering the Trojan, the researchers at BitDefender concluded that, at the moment, none of the servers included in the target list are vulnerable.

(Copyright by SoftPedia)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023