Security Incidents mailing list archives
Re: Strange Windows behavior / Spamming customers
From: rsh () idirect com
Date: Thu, 04 Mar 2004 18:59:20 -0500
I suppose you are referring to "Unter fremder Kontrolle" in c't 3/04. There is an excerpt of this article available online [1]. Unfortunately no translation to english. [1] http://www.heise.de/ct/04/03/118/ Regards Ansgar Wiechers
How to get a translation, as per below. 1. Open URL per [1] above 2. Copy the 'Unter fremder Kontrolle' 3. Open Google and do a search for this text 4. When it is found, ask Google to do the translation for you. The following is the Google translation.... It is indeed a word for word job and is NOT fixed into perfect English, but this technique is workable for a translation into French, Spanish or any other language that Google will do... c't 3/2004, P. 118: Viruses and Trojan horses Juergen Schmidt Under strange control Back doors and espionage programs In the virus statistics at present simple E-Mail worms, which foresaw it on maximum spreading, dominate beyond that however none or hardly harming functions exhibit. Larger danger proceeds however from Trojan horses, which spy data and which computers abuse as Spam centrifuge or for attacks on servers. The last large virus epidemic diseases actually ran off quite glimpflich. Worms such as Lovsan had only the own reproduction in the sense; genuine harming functions did not contain it. But as a result of the rather harmless worms increase parasits emerge, their authors it mean correctly serious. Formatting the non removable disk has as GAU for the user long retired. The virus amateur handicraftsmen discovered that it is many more worthwhile for them, to bring a system under their control as it to destroy. Trojaner re-tool therefore on the stricken systems additional functions, which steal entrance data and seriennummern or which remote control and administration of the system permit. The designation virus was established generally linguistic usage as generic term for computer parasits of all kinds. Since most parasits represent today combinations anyway, the distinction between viruses, which infect files for reproduction, has itself worms, which spread over the net, and Trojanern, which contain a hidden harming function, anyway survives. It would have to be called actually also Trojan horse correct instead of Trojaner, because the inhabitants Trojas were uebertoelpelt with the help of the alleged gift. But the handier abbreviation Trojaner was established within the computer range and also in the following for programs with hidden harming functions was used. If it was in former times quite usual to hide the harming routines in plays or utilities nowadays most Trojaner did without the useful packing and presents when starting at the most still another nothing saying error message. As their more harmless relatives also Trojaner spread mostly by E-Mail. Well made writing down tries to induce the receiver to open the attached file with the Trojaner. Particularly are thereby alleged updates or Patches for Windows or the InterNet Explorer like. But gradually also different methods come into mode. Thus there are already some Trojaner, which spread over exchange stock exchanges. In addition the program for example under promising names copies itself like "Download Accelerator.zip" or "password Cracker.rar" into a listing, which adds it to the approved files of KaZaA. Danger in the Web In recent time are also increased particularly prepared web pages, which use errors in the Microsofts InterNet Explorer, in order to download and implement a program from the InterNet. In the last months several of such safety gaps are in the InterNet Explorer admit become. On the one hand typically several weeks or months offense, until Microsoft makes a Patch available against it. With editorship conclusion there were for example still no Patch for in November the published problem in the showhelp function, over which a web page can install and start arbitrary files. On the other hand also thereafter still sufficient surfer who did not install this Patches, is. Such web pages "are applied" then frequently in News groups or via Chat and Instant Messaging and are often not not at first sight as dubiously recognizably heise Security recently to a page referred, which looked like a completely normal private web page of a Metallica fan, in the background however tried, a Trojaner to install. In December burglars prepared even a web page of the federal state parliament Mecklenburg-Western Pomerania in such a way that she automatically installed a Keylogger, which sent the spied data away to various servers in the InterNet. You read the complete article with detailed references to modern viruses and Trojanern in the current expenditure for print Comments: References to solutions of the problem "under strange control" (Torsten Valentin, 8,2,2004 14:11) RH: Virus/Trojaner - danger control loss over the own data (GreyEmmi, 7,2,2004 9:49) RH: Virus/Trojaner - danger control loss over the own data (Mateusz Mikusz, 5,2,2004 21:07) more... ===================================================== R.S.H. Toronto, ON, Canada Copyright retained. My opinions - no one elses... If this is illegal where you are, do not read it! --------------------------------------------------------------------------- Free 30-day trial: firewall with virus/spam protection, URL filtering, VPN, wireless security Protect your network against hackers, viruses, spam and other risks with Astaro Security Linux, the comprehensive security solution that combines six applications in one software solution for ease of use and lower total cost of ownership. Download your free trial at http://www.securityfocus.com/sponsor/Astaro_incidents_040301 ----------------------------------------------------------------------------
Current thread:
- Strange Windows behavior / Spamming customers Christopher Kunz (Mar 04)
- Re: Strange Windows behavior / Spamming customers Ansgar -59cobalt- Wiechers (Mar 04)
- Re: Strange Windows behavior / Spamming customers rsh (Mar 05)
- Re: Strange Windows behavior / Spamming customers Juri Haberland (Mar 05)
- <Possible follow-ups>
- RE: Strange Windows behavior / Spamming customers Thompson, Jimi (Mar 05)
- Re: Strange Windows behavior / Spamming customers Ansgar -59cobalt- Wiechers (Mar 04)