Feb 20 Alerts
Results 1 to 2 of 2

Thread: Feb 20 Alerts

  1. #1
    Senior Member
    Join Date
    Jan 2002
    Posts
    682

    Exclamation Feb 20 Alerts

    Backdoor.Infector
    Discovered on: February 20, 2002
    Last Updated on: February 20, 2002 at 10:59:45 AM PST

    Backdoor.Infector allows a hacker to remotely control an infected computer.

    Type: Trojan Horse

    Virus Definitions (Intelligent Updater): February 20, 2002
    Virus Definitions (LiveUpdateTM): February 20, 2002

    Threat Assessment:
    Damage: High

    Payload Trigger: Running Backdoor.Infector
    Payload:
    Releases confidential info: Stored passwords can be acquired
    Compromises security settings: Allows unauthorized access to the compromised computer

    Technical description:
    When Backdoor.Infector is run, it does the following:

    Presentation:
    This can vary. The hacker can merge this backdoor Trojan with a valid program so that the actual Trojan goes unnoticed when it is run.
    Hacker notification:
    This Trojan can be configured to use ICQ or IRC to notify the hacker that it successfully compromised a system.

    Communication with the hacker:
    Backdoor.Infector allows the hacker to take control of the compromised system by opening a port. The port can be configured by the hacker who creates the backdoor. By default, it uses port 35000.

    Control features:
    If Backdoor.Infector is run, it allows the hacker to remotely take control over the compromised computer, and can include:
    Fully control the file system
    Upload to and download from the host computer
    Run files of the hacker's choice
    Manage running processes
    Manipulate the registry
    Display messages
    Acquire passwords
    Redirect TCP traffic from one specific port to another port and IP address.
    View the screen
    Log key strokes
    Perform annoying actions, such as manipulate the mouse, open and close the CD-ROM drive, turn the monitor on and off, and so on.

    http://sarc.com/avcenter/venc/data/b....infector.html

    Backdoor.Subwoofer
    Discovered on: February 20, 2002
    Backdoor.Subwoofer allows a hacker to remotely control an infected computer.

    http://sarc.com/avcenter/venc/data/b...subwoofer.html
    I used to be With IT. But then they changed what IT was. Now what I'm with isn't IT, and what's IT seems scary and weird." - Abe Simpson

  2. #2
    Senior Member
    Join Date
    Sep 2001
    Posts
    193
    good info

    Thanks!
    [shadow]l3aDmOnKeY[/shadow]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides