[ISN] Trojan lurks, waiting to steal admin passwords

From: InfoSec News <alerts_at_private>
Date: Thu, 3 Jul 2008 03:41:38 -0500 (CDT)
http://www.infoworld.com/article/08/07/02/Trojan_lurks_waiting_to_steal_admin_passwords_1.html

By Robert McMillan
IDG News Service
July 02, 2008

Writers of a password-stealing Trojan horse program have found that a 
little patience can lead to a lot of infections.

They have managed to infect hundreds of thousands of computers -- 
including more than 14,000 within one unnamed global hotel chain -- by 
waiting for system administrators to log onto infected PCs and then 
using a Microsoft administration tool to spread their malicious software 
throughout the network.

The criminals behind the Coreflood Trojan are using the software to 
steal banking and brokerage account usernames and passwords. They've 
amassed a 50GB database of this information from the machines they've 
infected, according to Joe Stewart, director of malware research with 
security vendor SecureWorks.

"They've been able to spread throughout entire enterprises," he said. 
"That's something you rarely see these days."

Since Microsoft shipped its Windows XP Service Pack 2 software with its 
locked-down security features, hackers have had a hard time finding ways 
to spread malicious software throughout corporate networks. Widespread 
worm or virus outbreaks soon dropped off after the software's August 
2004 release.

But the Coreflood hackers have been successful, thanks in part to a 
Microsoft program called PsExec , which was written to help system 
administrators run legitimate software on computers across their 
networks.

[...]


_______________________________________________      
Attend Black Hat USA, August 2-7 in Las Vegas, 
the world's premier technical event for ICT security experts.
Featuring 40 hands-on training courses and 80 Briefings 
presentations with lots of new content and new tools.
Network with 4,000 delegates from 50 nations.  
Visit product displays by 30 top sponsors in 
a relaxed setting. http://www.blackhat.com
Received on Thu Jul 03 2008 - 01:41:38 PDT

This archive was generated by hypermail 2.2.0 : Thu Jul 03 2008 - 02:03:02 PDT