Feeds

Trojan horse hacks AOL passwords

Net users warned to be on the look out for rogue spam

  • alert
  • submit to reddit

Build a business case: developing custom apps

A UK security firm is warning Net users not to open files labelled "picture.exe" unless they come from a trusted source because of a rogue email attachment that steals user names and passwords before sending them to a Chinese address. According to Network Associates, the Trojan horse -- a malicious, security-breaking program disguised as something benign -- is being propagated by spam and scours hard drives to collect Web browser histories as well as AOL user names and passwords. The sinister twist in the tale is that no-one appears to know what happens to the information once it has been emailed to the mysterious Chinese address. Nor is anyone sure of the true scale of the problem but the Berkshire-based security company did confirm that it had logged a number of calls about it. According to Network Associates' antivirus consultant, Jack Clark, the motive behind the attack still isn't clear. "It's more a demonstration of what can be done," he said. "Once inside a PC, a Trojan could delete files -- it could, in fact, do anything at all. Luckily, this one doesn't, but I do expect to see more of this kind of thing in the future." "People should take the security implications of this very seriously," he added. "This is the first time in my experience that a Trojan Horse has been distributed to Net users in this way. People should be very worried about running executable files from untrusted sources," he said. A spokesperson for AOL said he didn't know of any reports of the Trojan Horse, dubbed "URLsnoop" by Network Associates, from users in the UK. The virus came to light a couple of days ago. Further information can be found at: http://beta.nai.com/public/stand_alone/picture.htm ®

Boost IT visibility and business value

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Fast And Furious 6 cammer thrown in slammer for nearly three years
Man jailed for dodgy cinema recording of Hollywood movie
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?