Skip to main content

A New Trojan Horse Attacks the Military and the Banks

This article is about : A New Trojan Horse Attacks the Military and the Banks



NetWitness is probably a name you haven't heard of, but the company is a major in corporate computer security - antivirus for the big boys, if you will. And in February, NetWitness called the alarm on a major Trojan horse attack on government and corporate computers. The attack has gained a lot of notoriety, and they call it the Zeus botnet. On the NetWitness website, the company's press release declares that there were 2500 corporations and government offices hit around the world. And they were not just hit by hackers passing the time for their schoolboy hijinks. This was an attack that stole large caches of corporate secrets (from companies like the pharmaceutical major Merck), and financial information like credit card numbers. Whoever did it, did it for money.
This particular attack is still on the rampage, and it hasn't been contained just yet. But this hasn't been an isolated incident either. For the past year and a half, a ring of cyber criminals in Germany has been using psychological tactics to get employees in major companies and US government agencies to click on tainted e-mail, or to go to tainted websites, in order that they might expose their computers to Trojan horse attacks or virus attacks that could get access to important information Once they had the information, it would have been worth a lot of money to the criminals. Military computer networks were infiltrated in the attack too. All of these computers were fully protected by at least standard-issue antivirus software, and those proved to be completely ineffective against the attacks. If you have an Internet connection, whether at home or at the office, you could consider yourself targeted. So how did it happen this time?



The ZeuS Trojan horse is basically available for free on the Internet for any mischief monger to use as he sees fit. If enough people carelessly allow the Trojan horse on their computers, the botnet program that lies within, links all the infected computers around the world together over the Internet, and operates them in concert. A botnet, if successful, can actually get together millions of computers to operate this way. Experts estimate that there are about 6000 botnets in operation right now. The botnet they're dealing with this time, is called the Kneber botnet, And it has managed to steal more than 50,000 usernames and passwords for all kinds of websites. Sign-in information from banks and social networking seems to be what they were after.

But perhaps it is a bit simplistic to assign a simple motive to an attack as sophisticated as this - to say that they were just after money. The botnet is so sophisticated; it unleashes other botnets, so that no one really knows when any particular one started operating. This is a botnet that mutates. It is difficult to tell where we go from here. As always, the best defense against attacks by viruses, botnets and Trojan horse devices, is a level of reasonable alertness, and good protection software.

Comments

Popular posts from this blog

Analyze Your Website and Competition for Free Organic Traffic & Put Your Site on Steroids

Analyze your website and competitor websites and unlock FREE organic traffic. website analysis , SEO analysis, rank and index analysis, much more. Understand at an even deeper level how Google works, what are the factors affecting your search engine ranking, what you need to do to get to page one ranking and how you can drive that extra organic traffic for free. Web Analysis: With help of web analysis module you will be get very deep analysis in right format like : Whois Info, MOZ Info, DMOZ Listing, Mobile Friendly Check, Keyword & Meta Info, Search Engine Index and lot more. Rank & Index Analysis : This Module gets your Alexa Data, SimilarWeb Data, MOZ Check, Google Index Check, Bing Index Check along with your Competitos dtaa In one single Dashboard to help you analyze where you stand against Competiton and what you need to do in order to beat them.. Social Network Analysis : Just add your Social Media page URLs and this module will get you all BI data for your page like - H...

How Fire and Storm Damage Restoration Professionals Can Assist

When fire and water damage restoration is necessary, there are various methods of approaching each clean-up and repair work task, depending upon the circumstances included. For example, what does it cost? water was associated with the flooding occurrence? Was the water reasonably tidy or was it infected with sewage, chemicals, or other toxic substances? For how long was the water permitted to sit ignored, permeating walls, carpet, wood kitchen cabinetry, and furniture? Were harmful chemicals involved in the fire? Just how much smoke and soot permeated the facilities? Just how much and what sort of poisonous fumes and gases were produced by the blaze? With fire and water damage restoration, there are other issues to consider too. Smoke and fire damages need to be cleaned out and properties need to be aerated to minimize odors. Floodwater, spills and water accidents need to be gotten rid of and dried as quickly as possible. When developing products are enabled to be constantly soaked in ...

The Importance of Digital Marketing For Your Small Business

Considering how plugged in our society has become, it's important that your business is also plugged in. The best way to put your brand or business right in front of your audience is through digital marketing . One of the biggest drivers of change in the marketing space is the adoption of mobile phones. Since mobile phones and the high-speed Internet made digital content more accessible to the public, companies have enjoyed benefits. This trend is only growing. 91 percent of companies have either moved or plan to move their digital marketing efforts in-house over the next year. The role of digital marketing is undeniable, and it will only intensify in the years to come. But it's only as effective as its presentation.