Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: ShadowAce

This does not sound good....


2 posted on 05/25/2007 2:34:43 PM PDT by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: All
New and improved version of Gozi Trojan horse on the loose
Stealthier Russian malware on the loose since April

******************************EXCERPT******************************

May 19, 2007 (Computerworld) -- A new, stealthier version of a previously known Russian Trojan horse program called Gozi has been circulating on the Internet since April 17 and has already stolen personal data from more than 2,000 home users worldwide.

The compromised information includes bank and credit card account numbers (including card verification value codes), Social Security numbers and online payment account numbers as well as usernames and passwords. As with its predecessor, the new version of Gozi is programmed to steal information from encrypted Secure Sockets Layer (SSL) streams and send the stolen information to a server in Russia.

The variant was discovered by Don Jackson, a security researcher at Atlanta-based SecureWorks Inc. who also discovered the original Gozi Trojan horse back in January.

Two core "enhancements"

According to Jackson, the new version is very similar to the original Gozi code in its purpose, but features two core enhancements. One of them is its use of a new and hitherto unseen "packer" utility that encrypts, mangles, compresses and even deletes portions of the Trojan horse code to evade detection by standard, signature-based antivirus tools. The original Gozi, in contrast, used a fairly commonly known packing utility called Upack, which made it slightly easier to detect than the latest version.

This version of Gozi also has a new keystroke-logging capability for stealing data, in addition to its ability to steal data from SSL streams. According to Jackson, the keystroke logger appears to be activated when the user of an infected computer visits a banking Web site or initiates an SSL session. It is still unclear how exactly the keystroke logger knows to turn itself on and capture information, Jackson said.

Apart from those two differences, the variant is identical to Gozi, Jackson said. The Trojan horse takes advantage of a previously fixed vulnerability in the iFrame tags of Microsoft Corp.'s Internet Explorer to infect systems. Users typically appear to be infected when visiting certain hosted Web sites, community forums, social networking sites and those belonging to small businesses.

A service provider steps in

The server to which the stolen data was being sent to was located on a Russian network.

6 posted on 05/25/2007 2:39:11 PM PDT by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: Ernest_at_the_Beach
This does not sound good....

Piece-a-cake, just cover your keys in tin foil.

it's Friday, ok? :)

31 posted on 05/25/2007 3:28:20 PM PDT by LasVegasMac (Give me 10 days and we'll be at war with those SOB's - I'll make it look like their fault!")
[ Post Reply | Private Reply | To 2 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson