Monday, December 9, 2013

He showed up five years ago, in November 2008th and soon won international fame thanks eboks to the


Trojan "Neverquest" (Trojan-Banker.Win32/64) which was first mentioned in July on a hacker forum zavorenog type until mid-November, eboks tried to infect thousands of computers around the world. It is a relatively new malware whose capacity is still not fully utilized.
Neverquest has what most other banking Trojans. He can change the contents of websites that can be opened in Internet Explorer eboks or Firefox in and put fake online forms to them, to steal usernames eboks and passwords, and other information that the victim leave the inserted phishing sites. Malware also provides an attacker to remotely control the infected computer using VNC (Virtual Network Computing).
Its default configuration defines the 28 targeted websites of major international banks as well as the popular online payment service. In addition to the so defined targets, Malware monitors and which websites users are visiting an infected eboks computer. When you identify certain key words such as "balance", "checking account" and "account overview", collected data on the contents of the Web site as well as its URL Malware sends attackers and they use this information to identify new sites of banks and adapted for Malware attacks eboks on them.
Once attackers have in your hands the information they need to access your account on the website, they use a proxy server to connect to the computer via VNC users directly access the account. This can be overcome by some protective mechanisms websites that needs to prevent unauthorized activity.
Neverquest steals FTP credentials that attackers then used to infect websites Neutrino package exploits, which exploit vulnerabilities in the browser and add-ons to install Malware Neverquest on the computers of users who are visiting these sites.
Trojan also steals the SMTP (Simple Mail Transfer eboks Protocol) and POP (Post Office Protocol) credentials from the email client and sends them to the attackers so that they can be used for sending spam emails with malicious attachments. These emails usually look like an official notice to the various services.
With infected computers Neverquest eboks steals eboks usernames and passwords for orders in social networks and chat services. Compromised orders can be used for sending links to infected websites with which distributes Neverquest and so enter into a vicious circle. However, it should be noted that criminals are still not using this option, or at least there is no evidence that this capacity malware so far utilized.
Ransomware is a term for malicious software that locks the browser or system displaying a warning message for alleged illegal activities using ... Next Nemački scientists have developed of malware transmits data through the air using high-frequency sound
More than half (56%) of the respondents who participated in a survey recently conducted by company Kaspersky eboks Lab said that more price data ... Next Jubilee: Five years from the appearance of Conficker, the Malware does not flinch
He showed up five years ago, in November 2008th and soon won international fame thanks eboks to the rapid spread but due to the fact that the n ... Experts continue to warn users of e-banking to a new threat, banakarskog Trojan Neverquest


No comments:

Post a Comment