Phishing attacks include Trojans

By
Follow google news

Phishing attackers are now including Trojan code, which could log keystrokes and capture passwords.

The UK's National High Tech Crime Unit is tracking attacks similar to standard phishing attempts, but with links to websites using malformed URLs to deliver the Trojan to victims.


The pages use known vulnerabilities in Internet Explorer to install the backdoor, which could be used to capture passwords, steal confidential data or use the host as a springboard for other activities such as sending spam or conducting denial of service attacks.

he criminals behind these attacks are constantly evolving their techniques and changing tactics to target a wider range of victims," said Len Hynds, Head of the NHTCU. "With this range of exploits being blended in one piece of code, it is not just about online banking. There is a second key logger and a program that allows the machine to act as a mail proxy that could be used by spammers."

The websites in question, operating in America and China, have been asked by the NHTCU to remove the accounts hosting the malware.

www.nhtcu.org

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

CBA builds two AI agents to boost cyber defences

CBA builds two AI agents to boost cyber defences

Researchers uncover 'Darksword' iPhone spyware

Researchers uncover 'Darksword' iPhone spyware

Stryker contains cyber attack on its Microsoft environment

Stryker contains cyber attack on its Microsoft environment

Exploited Google Chrome zero-days added to US must-patch list

Exploited Google Chrome zero-days added to US must-patch list

Log In

  |  Forgot your password?