LT   EN   RU  
Tuesday 30 May 2023 Straipsniai.lt - Independent and informative portal
Home
Phorum
Contacts
Login
Register   Login
News subscribe
Subscribe   Unsubscribe
Partners
www.slaptai.lt www.gamezone.lt
www.penki.lt www.hakeriai.lt
   
   
Advertising
Statistic
Visits since 2002 09 12 - 69789115
Pages in Straipsniai.lt: 40735
  
  Computers > Computer technologies > Hackers
Lankomumo reitingas Print version Print version
Troy-horses infects Windows Media files?
Video files appear that download malicious application when they are run. These files are .wmv files infected by Trj/WmvDownloader.A and Trj/WmvDownloader.B, two Trojans that take advantage of a new technology incorporated in Microsoft Windows Media player to install spyware, adware and dialers, as well as computer viruses.

PandaLabs has detected the appearance of two new Trojans, Trj/WmvDownloader.A and Trj/WmvDownloader.B, which are spreading through P2P networks in video files. These Trojans take advantage of the new technology incorporated in Microsoft Windows Media player called Windows Media Digital Rights Management (DRM), designed to protect the intellectual property rights of multimedia content. When a user tries to play a protected Windows media file, this technology demands a valid license. If the license is not stored on the computer, the application will look for it on the Internet, so that the user can acquire it directly or buy it. This new technology is incorporated through the Windows XP Service Pack 2 + Windows Media Player 10 update.

The video files infected by these Trojans have a .wmv extension and are protected by licenses, supposedly issued by the companies overpeer (for Trj/WmvDownloader.A), or protectedmedia (for Trj/WmvDownloader.B). If the user runs a video file that is infected by one of these Trojans, they pretend to download the corresponding license from certain web pages. However, what they actually do is redirect the user to other Internet addresses from which they download a large number adware (programs that display advertisements on screen), spyware, dialers (applications that dial-up high rate toll numbers) and other viruses. Below are some examples of the malicious programs and viruses these Trojans download:

Adware/Funweb
Adware/MydailyHoroscope
Adware/MyWay
Adware/MyWebSearch
Adware/Nsupdate
Adware/PowerScan
Adware/Twain-Tech
Dialer Generic
Dialer.NO
Spyware.AdClicker
Spyware/BetterInet
Spyware/ISTbar
Trj/Downloader.GK

Even though these Trojans have been detected in video files with extremely variable names which can be downloaded through P2P networks like KaZaA or eMule, bear in mind that they can also be distributed through other means, such as files attached to email messages, FTP or Internet downloads, floppy disks, CD-ROM, etc.

Panda Software has made the corresponding updates to its anti-malware solutions available to its clients to detect and disinfect any video file protected by the licenses used by Trj/WmvDownloader.A and Trj/WmvDownloader.B to carry out their malicious actions. Similarly, the Panda Software solutions protect users against the malware that these Trojans try to install on computers.

         
Lankomumo reitingas

Diskusijos - Discusions

Versija spausdinimui - Print version

Atgal
Random tags:    Procesors (2)    Kisses (13)    Motorcycles (33)    Geography (10)    Martial arts (7)    Cinema (20)    Modems (2)    Computers (355)    Beer (10)    Internet (4)    Love (48)    Tourism (46)    Religion (34)    Agrobusiness (2)    SSL certificates (10)    Art (10)    V.Nabokov (54)    Culture (57)    Mysticism 2 (3)    Sound systems (10)    Dogs (17)    Photography (3)    Automobiles (10)    Hackers (59)    UFO (39)    Mother and child (17)    Operating systems (19)    Badminton (3)    Law (11)    Physics (5)    Scaners (10)    Prose (11)    Fencing (2)    Paintball (10)    Skydiving (10)    Cats (14)    Fantasy (10)    Sport gymnastics (9)    Politics (13)    Laptops (10)    Aviculture (2)    Music (10)    PHP (3)    Computer games (64)    Show-business (11)    Aquariums (28)    Guns (11)    Animals (65)    Geology (4)    People (56)
1. Bill Gates and other communists
2. Wi-Fi overtakes Ethernet for home networks
3. Worm plays games with victims
4. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
5. iWork productivity software targets Microsoft's Office
6. Taiwan police seize 60,000 suspect AMD CPUs
7. IDC: 3 future technologies
8. phpBB Attachment Mod: new vulnerabilities discovered
9. Windows XP SP2 Firewall shows your files and printers to every Internet user
10. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
1. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
2. Taiwan police seize 60,000 suspect AMD CPUs
3. Who says safe computing must remain a pipe dream?
4. Bill Gates and other communists
5. phpBB Attachment Mod: new vulnerabilities discovered
6. Feds try to take logs from Nmap creator
7. iWork productivity software targets Microsoft's Office
8. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
9. New Internet domains in the works
10. Windows XP SP2 Firewall shows your files and printers to every Internet user
Map