Another entry in the sunbelt discovery of a keylogger



Sunbeltblog has another entry in the continuing story. Really, there is not much new here, but iDefense has analyzed the code of the trojan that was discovered and have stated that it is not related to CoolWebSearch. (Which is what sunbeltblog has been saying for some time.) They initially said it was discovered during a coolwebsearch infestation.



They do go on to remind the reader of the what they have said about it and that it was a variant of the dumaru / nibu trojan family.

Related Posts

Blog Traffic Exchange Related Posts
  • Zotob Worm According to The Sans handlers diary, a worm exploiting one of the security vulnerabilities disclosed last week by Microsoft, is in the wild and spreading. The worm tagged as zotob.a exploits the ms05-039 vulnerability. (Sans reminds us that ms02-039 was the vuln. targetted by the slammer worm. Interesting coincidence.) They......
  • More rogue security software Wolves in sheeps clothing.... from Sunbelt blog.... Watch out for pestcapture and "friends" (using dlls from spysheriff). Thanks to sunbelt for keeping their eyes open on the threat of wolves in sheepdogs clothing.... It's so frustrating having to explain to someone that the software they downloaded to solve their problems......
  • Would you like spyware with that? Apple too.... These stories come up from time to time. A free giveaway of some sort and it turns out that there's spyware or a virus embedded, company gives a big "whoops" and fixes things by replacing them.... McDonalds had a promotion going where up to 10,000 people could win a flash......
Blog Traffic Exchange Related Websites
  • Home Security - Don't Make Yourself a Target In 2004, the Justice Bureau released the statistics that nearly one in six homes were burgled, that 75% of all crime was related to property and that in 90% of the burglaries the burglar gained access into the home. Every 3 seconds a property crime occurs, and every 15 seconds......
  • Keep Readers Coming Back to Your Blog If you have a blog, you want to keep readers coming back. You can attract readers in a variety of ways, but keeping them is a little harder. You may end up high in the search engines for tons of keywords and pull in tons of unique page views. But......
  • Trojan Horse Protection - Antivirus Trojan Software In today’s online environment it’s important to know what risks lie ahead at each click. This paper will describe so of the malicious kinds of attacks your Home/Office PC may encounter online. Now I’m sure we have all heard of Viruses online and some of you have heard of Trojans.......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site