Phishing attacks include Trojans

By
Follow google news

Phishing attackers are now including Trojan code, which could log keystrokes and capture passwords.

The UK's National High Tech Crime Unit is tracking attacks similar to standard phishing attempts, but with links to websites using malformed URLs to deliver the Trojan to victims.


The pages use known vulnerabilities in Internet Explorer to install the backdoor, which could be used to capture passwords, steal confidential data or use the host as a springboard for other activities such as sending spam or conducting denial of service attacks.

he criminals behind these attacks are constantly evolving their techniques and changing tactics to target a wider range of victims," said Len Hynds, Head of the NHTCU. "With this range of exploits being blended in one piece of code, it is not just about online banking. There is a second key logger and a program that allows the machine to act as a mail proxy that could be used by spammers."

The websites in question, operating in America and China, have been asked by the NHTCU to remove the accounts hosting the malware.

www.nhtcu.org

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Researchers detail Bluetooth headphone attack that can hijack smartphones

Researchers detail Bluetooth headphone attack that can hijack smartphones

Patients fret as ManageMyHealth data breach drama plays out

Patients fret as ManageMyHealth data breach drama plays out

Telstra used ConnectID impermissibly for months

Telstra used ConnectID impermissibly for months

Chinese cyberattacks on Taiwan infrastructure averaged 2.6 million a day in 2025

Chinese cyberattacks on Taiwan infrastructure averaged 2.6 million a day in 2025

Log In

  |  Forgot your password?