Two new Trojan horse attacks are currently being sent via an e-mail spam format across the Internet by a hacker who persuades users to install it as a new screen saver, and then uses it to get access to those users' systems.
The BackDoor-G Trojan horse is being distributed like spam e-mail to users in the guise of a new screensaver, a game update, and other deceptions. Once installed, the program will provide an individual with complete surreptitious access to the client system. A similar Trojan horse is also currently spreading through France under the name Armageddon, and may spread to the US as well. Both programs are essentially the same, but use different files names.
"Basically, they just open a hole into enterprises," said Sal Viveros, group marketing manager for Total Virus Defense at Network Associates, which has received several samples of the attack since Wednesday. "It's really just a hack tool for hackers to gain entrance to individuals, companies, whatever."
The Trojan horse, when installed, will have the client "ping" an alert to the hacker to inform them of the successful installation of the backdoor program. However, Network Associates is still following the electronic trail to the hacker.
"We're still trying to figure out exactly where that is going," said Viveros. "[And] it doesn't seem to be any specific industry or group is being targeted."
The new Trojan horses are similar to previous attacks that enabled hackers to secretly gain access to a client system, such as BackOrifice and NetBus, as they represent a new mixture of virus and intrusion tools, according to Viveros. The new mixture of technologies now requires security updates to be issued to more than one type of security application.
"We're adding this to our antivirus program, but we're also adding this to CyberCop, our intrusion-detection application, because it really is both," said Viveros. "It's starting to blur the lines between malicious code attack and security vulnerability."
BackDoor-G and Armageddon are also difficult to detect because both have the capability of changing their file names, and therefore hiding from some traditional methods of simply deleting suspicious files.
To protect against the risk of vulnerability, users should request an update for both their antivirus and intrusion-detection software, according to Viveros.http://www.nai.com