Trojan variants hide behind rootkits

Powered by SC Magazine
 

Haxdoor mutates to steal confidential info.

New variants of the Haxdoor trojan have been discovered in the wild, security firm Panda Software has reported. 

The mutants are particularly dangerous because they use a rootkit to hide their actions and avoid detection.

Several new versions of the Haxdoor family of trojans have emerged over the past few days. The malware tries to steal confidential user details in order to commit online fraud and identity theft.

The latest strains have several common characteristics, including a capacity to install a rookit designed to hide objects, such as processes, files or entries.

Haxdoor uses this rootkit to hide itself on the computer from the user and the majority of traditional security systems.

All the new variants are designed to steal passwords for popular internet services, such as EBay, ICQ, PayPal and WebMoney, and for many email clients, including Outlook Express and The Bat.

The malware also makes modifications to any firewalls installed on the compromised computer in order to authorise its own malicious processes. By doing this, it removes any obstacles designed to prevent stolen data being transmitted.

"It seems that the authors of these malicious codes are mass-mailing these Trojans as attachments to spam messages," said Luis Corrons, director of PandaLabs.

"For this reason, it is recommended to delete any suspicious or unwanted email messages. These trojans are very dangerous, above all due to their capacity to use a rootkit to hide their actions.

"It is highly advisable to complement traditional antivirus solutions with proactive technologies that can detect suspicious processes based on behavioural analysis."

Panda is offering its free, online ActiveScan anti-malware check to clean up affected PCs.

Copyright ©v3.co.uk


Trojan variants hide behind rootkits
 
 
 
Top Stories
Toll Group to go Google
Poaches Woolworths project manager.
 
How News Corp's CIO tackled skills in his race to the cloud
What to do when your team’s talents are no longer needed.
 
Photos: How Thodey transformed Telstra
From turbulent Trujillo to Australia's leading telco.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  35%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3966

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 1353

Vote