"Now we're seeming to blur the lines between malicious code attacks and vulnerability. Earlier versions of Windows (TM) had this vulnerability which made it possible for malware server code to be installed, unknown to a user, which and to establish control remotely. The initial intent of the software has been twisted into an insidious and malicious threat vector. Such tools represent a dangerous blending of what might once have been considered relatively harmless pranks by virus writers and hackers, Viveros said: "We're seeing these types of malicious code attacks, which are trying to attack information directly or indirectly," he said. Definition: The origin of back orifice, a program that makes remote administration of a computer system possible, was legitimate. Once a victim is infected, a hacker can do anything to a machine that the victim can - included erasing all files or copying all files. With both programs, a victim is tricked into executing an e-mail attachment which then opens his PC to remote connections via the Internet. NetBus, another such tool, has since been developed into a commercial product by its author. Such "remote administration tools" started to surface last year when Back Orifice was released by a group calling itself the Cult of the Dead Cow. Updated versions of virus-scanning software, including Network Associates products, will detect BackDoor-G and clean it from a victim's system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |