LT   EN   RU  
Wednesday 23 October 2019 Straipsniai.lt - Independent and informative portal
Home
Phorum
Contacts
Login
Register   Login
News subscribe
Subscribe   Unsubscribe
Partners
www.slaptai.lt www.gamezone.lt
www.penki.lt www.hakeriai.lt
   
   
Advertising
Statistic
Visits since 2002 09 12 - 66081050
Pages in Straipsniai.lt: 40735
  
  Computers > Computer technologies > Hackers
Lankomumo reitingas Print version Print version
Troy-horses infects Windows Media files?
Video files appear that download malicious application when they are run. These files are .wmv files infected by Trj/WmvDownloader.A and Trj/WmvDownloader.B, two Trojans that take advantage of a new technology incorporated in Microsoft Windows Media player to install spyware, adware and dialers, as well as computer viruses.

PandaLabs has detected the appearance of two new Trojans, Trj/WmvDownloader.A and Trj/WmvDownloader.B, which are spreading through P2P networks in video files. These Trojans take advantage of the new technology incorporated in Microsoft Windows Media player called Windows Media Digital Rights Management (DRM), designed to protect the intellectual property rights of multimedia content. When a user tries to play a protected Windows media file, this technology demands a valid license. If the license is not stored on the computer, the application will look for it on the Internet, so that the user can acquire it directly or buy it. This new technology is incorporated through the Windows XP Service Pack 2 + Windows Media Player 10 update.

The video files infected by these Trojans have a .wmv extension and are protected by licenses, supposedly issued by the companies overpeer (for Trj/WmvDownloader.A), or protectedmedia (for Trj/WmvDownloader.B). If the user runs a video file that is infected by one of these Trojans, they pretend to download the corresponding license from certain web pages. However, what they actually do is redirect the user to other Internet addresses from which they download a large number adware (programs that display advertisements on screen), spyware, dialers (applications that dial-up high rate toll numbers) and other viruses. Below are some examples of the malicious programs and viruses these Trojans download:

Adware/Funweb
Adware/MydailyHoroscope
Adware/MyWay
Adware/MyWebSearch
Adware/Nsupdate
Adware/PowerScan
Adware/Twain-Tech
Dialer Generic
Dialer.NO
Spyware.AdClicker
Spyware/BetterInet
Spyware/ISTbar
Trj/Downloader.GK

Even though these Trojans have been detected in video files with extremely variable names which can be downloaded through P2P networks like KaZaA or eMule, bear in mind that they can also be distributed through other means, such as files attached to email messages, FTP or Internet downloads, floppy disks, CD-ROM, etc.

Panda Software has made the corresponding updates to its anti-malware solutions available to its clients to detect and disinfect any video file protected by the licenses used by Trj/WmvDownloader.A and Trj/WmvDownloader.B to carry out their malicious actions. Similarly, the Panda Software solutions protect users against the malware that these Trojans try to install on computers.

         
Lankomumo reitingas

Diskusijos - Discusions

Versija spausdinimui - Print version

Atgal
Random tags:    Archaeology (12)    Motorcycles (33)    Geography (10)    Business (25)    Kisses (13)    E - commerce (10)    Laptops (10)    Eurointegration (4)    Soldiership (12)    Cryptography (10)    Beer (10)    Floriculture (10)    Law (11)    Sport (81)    Science (163)    Gymnastics (9)    Philosophy (2)    People (56)    Telecomunication (40)    Printers (12)    Krishnaism (10)    Mobile communication (9)    Hackers (59)    Computers (355)    Tourism (46)    Philately (8)    Biology (66)    Helping and prevention (14)    Sport gymnastics (9)    Countries (43)    Ecology (10)    Monitors (10)    Dolphins (6)    Nursing (4)    Heathendom (3)    Egypt (43)    Love (48)    Cats (14)    Education (174)    Aquariums (28)    Horoscopes (4)    Style (3)    Aviculture (2)    Fantasy (10)    History (4)    Pedagogics (10)    Viruses (10)    Geology (4)    Tales (13)    Paintball (10)
1. Bill Gates and other communists
2. Wi-Fi overtakes Ethernet for home networks
3. Worm plays games with victims
4. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
5. iWork productivity software targets Microsoft's Office
6. Taiwan police seize 60,000 suspect AMD CPUs
7. IDC: 3 future technologies
8. phpBB Attachment Mod: new vulnerabilities discovered
9. Windows XP SP2 Firewall shows your files and printers to every Internet user
10. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
1. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
2. Taiwan police seize 60,000 suspect AMD CPUs
3. phpBB Attachment Mod: new vulnerabilities discovered
4. Who says safe computing must remain a pipe dream?
5. Bill Gates and other communists
6. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
7. Feds try to take logs from Nmap creator
8. New Internet domains in the works
9. Kazaa creates worst spyware threat, says CA
10. Windows XP SP2 Firewall shows your files and printers to every Internet user
Map