Security Incidents mailing list archives

Re: Strange Windows behavior / Spamming customers


From: rsh () idirect com
Date: Thu, 04 Mar 2004 18:59:20 -0500

I suppose you are referring to "Unter fremder Kontrolle" in c't 3/04.
There is an excerpt of this article available online [1]. Unfortunately
no translation to english.

[1] http://www.heise.de/ct/04/03/118/

Regards
Ansgar Wiechers

How to get a translation, as per below.

1. Open URL per [1] above
2. Copy the 'Unter fremder Kontrolle'
3. Open Google and do a search for this text
4. When it is found, ask Google to do the translation for you.

The following is the Google translation.... It is indeed a word for word
job and is NOT fixed into perfect English, but this technique is
workable for a translation into French, Spanish or any other language
that Google will do...

c't 3/2004, P. 118: Viruses and Trojan horses                   
                
Juergen Schmidt
Under strange control
Back doors and espionage programs

In the virus statistics at present simple E-Mail worms, which foresaw it
on maximum spreading, dominate beyond that however none or hardly
harming functions exhibit. Larger danger proceeds however from Trojan
horses, which spy data and which computers abuse as Spam centrifuge or
for attacks on servers.

The last large virus epidemic diseases actually ran off quite
glimpflich. Worms such as Lovsan had only the own reproduction in the
sense; genuine harming functions did not contain it. But as a result of
the rather harmless worms increase parasits emerge, their authors it
mean correctly serious. Formatting the non removable disk has as GAU for
the user long retired. The virus amateur handicraftsmen discovered that
it is many more worthwhile for them, to bring a system under their
control as it to destroy. Trojaner re-tool therefore on the stricken
systems additional functions, which steal entrance data and
seriennummern or which remote control and administration of the system
permit.

The designation virus was established generally linguistic usage as
generic term for computer parasits of all kinds. Since most parasits
represent today combinations anyway, the distinction between viruses,
which infect files for reproduction, has itself worms, which spread over
the net, and Trojanern, which contain a hidden harming function, anyway
survives. It would have to be called actually also Trojan horse correct
instead of Trojaner, because the inhabitants Trojas were uebertoelpelt
with the help of the alleged gift. But the handier abbreviation Trojaner
was established within the computer range and also in the following for
programs with hidden harming functions was used.

If it was in former times quite usual to hide the harming routines in
plays or utilities nowadays most Trojaner did without the useful packing
and presents when starting at the most still another nothing saying
error message. As their more harmless relatives also Trojaner spread
mostly by E-Mail. Well made writing down tries to induce the receiver to
open the attached file with the Trojaner. Particularly are thereby
alleged updates or Patches for Windows or the InterNet Explorer like.

But gradually also different methods come into mode. Thus there are
already some Trojaner, which spread over exchange stock exchanges. In
addition the program for example under promising names copies itself
like "Download Accelerator.zip" or "password Cracker.rar" into a
listing, which adds it to the approved files of KaZaA.
Danger in the Web

In recent time are also increased particularly prepared web pages, which
use errors in the Microsofts InterNet Explorer, in order to download and
implement a program from the InterNet. In the last months several of
such safety gaps are in the InterNet Explorer admit become. On the one
hand typically several weeks or months offense, until Microsoft makes a
Patch available against it. With editorship conclusion there were for
example still no Patch for in November the published problem in the
showhelp function, over which a web page can install and start arbitrary
files. On the other hand also thereafter still sufficient surfer who did
not install this Patches, is.

Such web pages "are applied" then frequently in News groups or via Chat
and Instant Messaging and are often not not at first sight as dubiously
recognizably heise Security recently to a page referred, which looked
like a completely normal private web page of a Metallica fan, in the
background however tried, a Trojaner to install. In December burglars
prepared even a web page of the federal state parliament
Mecklenburg-Western Pomerania in such a way that she automatically
installed a Keylogger, which sent the spied data away to various servers
in the InterNet.

You read the complete article with detailed references to modern viruses
and Trojanern in the current expenditure for print

Comments:
References to solutions of the problem "under strange control" (Torsten
Valentin, 8,2,2004 14:11)
RH: Virus/Trojaner - danger control loss over the own data (GreyEmmi,
7,2,2004 9:49)
RH: Virus/Trojaner - danger control loss over the own data (Mateusz
Mikusz, 5,2,2004 21:07)
more...
=====================================================
R.S.H.                            Toronto, ON, Canada

                 Copyright retained.
             My opinions - no one elses...
 If this is illegal where you are, do not read it!

---------------------------------------------------------------------------
Free 30-day trial: firewall with virus/spam protection, URL filtering, VPN,
wireless security

Protect your network against hackers, viruses, spam and other risks with Astaro
Security Linux, the comprehensive security solution that combines six
applications in one software solution for ease of use and lower total cost of
ownership.

Download your free trial at 
http://www.securityfocus.com/sponsor/Astaro_incidents_040301
----------------------------------------------------------------------------


Current thread: