TITLE

Hybrid SSL/keylogger Malware Surfaces

PUB. DATE
June 2007
SOURCE
Database & Network Journal;Jun2007, Vol. 37 Issue 3, p24
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that Tier-3 has revealed the presence a highly dangerous hybridized version of the Russian Gozi virus that not only has an integrally-coded keylogger, but has the ability to get data from an SSL stream. The keylogger capability is triggered only when an infected personal computer visits an electronic banking web site. The virus variant was discovered by SecureWorks researcher Don Jackson, who also discovered the original virus in January 2007. Jackson had reported that this variant has a packing utility that hides the virus code.
ACCESSION #
25583618

 

Related Articles

  • Forget About the Viruses, Focus on the Bad Behavior. Rives, Karin // Newsweek (Pacific Edition);12/3/2007 (Pacific Edition), Vol. 150 Issue 23, p10 

    The article discusses innovations in computer security designed to intercept computer viruses before they can damage systems. Several Swedish websites and web hosts such as Proinet were targeted by computer hackers following the publication of Swedish cartoons lampooning the prophet Muhammad....

  • Creeping threat of stealth. Bradbury, Danny // Computer Weekly;11/25/2008, p22 

    The article focuses on the concept of stealth technology. It is reported that with modern malware trying to hide itself and generate profit for its writers, stealth technology is the rule rather than exception. The most effective form of stealth attack is rootkit which conceals its presence by...

  • US Sports Site Hacked.  // Database & Network Journal;Dec2007, Vol. 37 Issue 6, p23 

    The article provides information on the views of security vendor Tier-3 on the hacking issue in the notable sports Web sites in the U.S. The main targets of the computer hackers includes the US Major League Baseball and the National Hockey League Web sites. The Tier-3 views that the hacking...

  • New Year, New Hacks? Sausner, Rebecca // Bank Technology News;Dec2010, Vol. 23 Issue 12, p9 

    The article focuses on new variants of criminal enterprise in the online banking industry which are expected to increase in 2011. Don Jackson of SecureWorks says that while security sophistication is advancing, there has been nothing revolutionary. A survey by PhoneFactor reveals that Zeus-style...

  • Bots on your net? Look twice. Dix, John // Network World;6/11/2007, Vol. 24 Issue 23, p20 

    The article focuses on the future danger posed by Internet bots on consumers and corporate resources in the U.S. According to information and technology research firm Gartner Inc., by the end of 2007 about 75% of business enterprises will be infected with undetectable and financially motivated...

  • Anti-virus: alive and kicking. Twentyman, Jessica // SC Magazine: For IT Security Professionals (UK Edition);Mar2009, p34 

    This article discusses the rumors of the death of anti-virus software. It highlights the protection of the imminent death of traditional anti-virus technologies. It indicates the argument made by analysts that this kind of technology can only respond to threats it has seen before. It stresses...

  • The rise of 'badvertising'. Vaas, Lisa // eWeek;11/26/2007, Vol. 24 Issue 36, p18 

    The article discusses the penetration of malwares in legitimate advertising web sites in the U.S. According to the author, users were able to access and download viruses and other malicious files without realizing the real content and damages brought by bad advertising wherein it reached 1,000%...

  • More Malicious Attacks On The Threat Horizon warns ISF.  // Software World;Jul2008, Vol. 39 Issue 4, p23 

    The article reports on the warning given by the Information Security Forum (ISF) to computer users in Great Britain. The ISF warns the public that there will be an increase in malicious threats including attacks from organised crime and industrial espionage, together with the increase in mobile...

  • Browsers: The new threat landscape. Garcia, Andrew // eWeek;8/4/2008, Vol. 25 Issue 23, p42 

    The article reports on the strategies that need to be developed by information technology (IT) pesonnel and computer security companies to address computer and data security risks brought by malicious software (malware) in the U.S. It reveals that the development of domains and Web sites that...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics