![]() ![]() "The initial (Trojan) dropped like an Acrobat update, bearing an Adobe symbol, and it was extremely well executed," she said. Vice president for worldwide content at SurfControl, Susan Larson informed that the malicious software is more complex than majority of those secured to spoof emails. Troj/Goldun-NQ contains functionality to go online and link up with a remote computer through HTTP," informs security marketer Sophos on its site. The keyword-thieving Trojan "Troj/Goldun-NQ for the Windows platform, deposits more malicious code, records keystrokes & watches browser action. These spams connect to malicious codes on other computer that resembles the malware in the initial Adobe spoof email. Next, it fixes other malware that transforms the affected computer into a zombie that releases spams resembling a Microsoft ad for Windows Live Messenger. The Trojan next opens the pertinent Adobe "read me" file in the browser so as to look genuine. Upon opening the link, the e-mail transfers a Trojan keylogger (Goldun.nq) that, after running, transmits further malwares that scrutinize the consumer's browser, possibly thieving their personal information. ![]() The e-mail requests readers to transfer the newest variant of Adobe Reader 7.0.8. Trojan Keylogger Downloaded With Adobe Spoof EmailĪ spoof message aiming Adobe users - purporting to have the recent variant of the firm's PDF reader, but actually bearing a malevolent Trojan keylogger - has been detected in the wild, as per investigators at SurfControl.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |