Sunday, February 26, 2006

Weekly Virus Threat Report

This week's report focuses on four malicious codes. The first of these, following in the wake of the code that was reported last week for Mac OS/X, is Inqtana.A. We're also looking at the bot SpyBot.AAV and the Trojan Torpig.AE, both of which are designed forstealing confidential information, as is Briz.A, which has led to the uncovering of a complex network for creating data-stealing Trojans.

Inqtana.A is a worm that only affects computers with the operating system Mac OS X 10.4 installed, although it has no destructive effects, it only spreads itself (via Bluetooth) in order to affect as many computers as possible. If the affected user accepts it or the system is configured to accept requests without the user's approval, Inqtana.A copies its files in thedefault file exchange directory.

If the computer also has the CAN-2005-1333 vulnerability, Inqtana.A copies its files in a special folder of the operating system. In this way, the worm ensures that it is run whenever the computer is started.

SpyBot.AAV and Torpig.AE collect a range of information from computers, such as the IP address, free memory space, operating system, RAM, microprocessor speed, etc. They then send this information back to their creators so they can install more trojans to hijack data, reroute browsers and trigger ads from which they benefit.

However, the most notable code this week is Trj/Briz.A, not so much for the code itself, but for the network of crimeware that has been discovered thanks to this Trojan. The code collects information about passwords and activity on the computer that it has infected.

The designers of Briz.A are part of the new business model arising among the creators of malware. Instead of creating code purely for fun they are now doing so for financial gain, both through selling the code (acustomized version of Briz.A is on offer for $990) or by fraudulently using the data obtained.

Everynon needs to make sure there computer is secure. Use the menu links to access free tools for protecting your PC or to compare the top protection programs.