Feeds

Super DIRT Trojan to infect indiscriminately

We'll call this one F.I.L.T.H.

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

The DIRT files Our friend Frank Jones of Codex Data Systems has been busy with a number of projects associated with his loathsome DIRT Trojan, most notably one which seeks to distribute the infection indiscriminately. Cryptome's John Young has posted an HTML version of Jones' PowerPoint slide show, and from this we gather that Jones either has, or is struggling to develop, a super-malicious strain of his little viral toy.

The latest incarnation is called HOPE, for "Harnessing the
Omnipotent Power of the Electron." It sounds positively Biblical, but it's a mere h4x0r kiddie project which involves setting up a malicious Web site to infect all visitors indiscriminately, and to exploit the infection as victims spread it to their e-mail and IM contacts. Everyone infected will of course yield remote access to their computers via the DIRT Trojan.

Jones recommends its use in combating terrorists, pedos and drug traffickers, and for employee monitoring. It's also perfectly suited to industrial espionage. Just set up a Web site which will interest your competitors, and infect them with the DIRT Trojan. How cool is that?

It could also be effective for mass government surveillance in less enlightened countries.

One thing it would be absolutely useless for, of course, is legitimate law enforcement. But that doesn't concern our Jones. He's happily bottom-feeding off LEAs and securocrats in countries where civil rights are weak, and off corrupt and/or stupid LEAs and securocrats here in the civilized world. ®

Related Stories

Cyber cops & security orgs: DIRTy, stupid and out of control
Law-enforcement DIRT Trojan released
Reg duped by crime-busting D.I.R.T Trojan

Beginner's guide to SSL certificates

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.