Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 07/15/2010 10:23:03 AM PDT by Gomez
[ Post Reply | Private Reply | View Replies ]


To: ShadowAce

ping


2 posted on 07/15/2010 10:23:52 AM PDT by Gomez (killer of threads)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Gomez

Hmm, where are most USB Flash Drives manufactured these days?


3 posted on 07/15/2010 10:26:45 AM PDT by Yo-Yo (Is the /sarc tag really necessary?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Gomez
This means that the sample trojans found so far can't simply be started on an arbitrary Windows system – the malware will only start in the OllyDbg debugger after some modifications to the code.


So, this affects what percentage of Windows users?

"after some modifications to the code"
Sounds like you have to mess with the system just to get the malware to work.
Don't think I'll lose any sleep over this one.
4 posted on 07/15/2010 10:32:26 AM PDT by Gun142 (Where Will You Be When You Get Where You're Going? -- Jerry Clower)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Gomez
It appears that the malware specifically targets process control systems and their visualisation components.

SCADA systems are those that monitor and control infrastructure facilities like power plants, gas lines, sewage plants etc.

This isn't the work of script kiddies trying to muck up your web-surfing. This appears to be targeted at serious systems by a knowledgeable attacker(s).

6 posted on 07/15/2010 10:53:33 AM PDT by Washi
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

PING.... our turn at bat.


7 posted on 07/15/2010 11:29:00 AM PDT by RachelFaith (2010 is going to be a 100 seat Tsunami - Unless the GOP Senate ruins it all...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier
a copy of the trojan managed to infect a fully patched Windows 7 system (32-bit) without having to resort to such common auto-start tools as autorun.inf when a Flash drive carrying the trojan was plugged in. Instead of spreading through auto-start, the malware exploits a flaw in the code for processing short-cuts (.lnk files): Once the relevant icon is displayed in Windows Explorer, malicious code is launched without any further user interaction.

Well, there goes your "Windows 7 is just as secure as Mac OSX" shtick.

Real trogan, in the wild, doing an actual exploit, not in some lab, and without any user intervention required.

Plink Plink Plink

Just dropping 3 quarters in the machine and waiting for the spin cycle to begin....

8 posted on 07/15/2010 11:33:26 AM PDT by RachelFaith (2010 is going to be a 100 seat Tsunami - Unless the GOP Senate ruins it all...)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson