The malware reaches computer networks via an email attachment or through a concealed internet download. Once activated, the Trojan installs more malicious code on to the system, designed to steal passwords, login details and other private data.
The program allows an attacker to compromise the machine and control it remotely. The Trojan also simulates clicking OK on the computer firewall warnings when it alerts the user to a suspicious internet connection. LdPinch.ZO mimics the user to continue accessing the web and stealing information, according to reports.
“Corporate espionage is just one of the multiple uses that this type of Trojan can have,” warned Luis Corrons, technical director at PandaLabs.
“Companies keep confidential information in their computers or email accounts. Thanks to this malicious code, a cyber criminal could get this data and sell it or use it for their own benefit.”
Experts: LdPinch.ZO Trojan discovered
By Fiona Raisbeck on Mar 21, 2007 2:49AM