contents

software
 
Panda Software's Weekly Report on Viruses and Intruders

This week's report looks at three malicious code: the Banker.FJI Trojan and the Foamer.A and Spamta.NB worms. Banker.FJI is a Trojan that displays false login screens when users visit the web pages of certain Brazilian banks, such as Banco do Brasil, Bradesco or Itau. When users enter their login details in the spoof pages, or in the legitimate pages monitored by the Trojan, this data is entered in a text file which is then sent to the creator of the Trojan. It also monitors the Internet traffic generated when visiting websites related with Banco do Brasil.

Banker.FJI cannot spread automatically using its own means and therefore, needs an attacker to distribute it. The means of distribution used vary and include floppy disks, CD-ROMs, email messages with attachments, Internet download, files transferred via FTP, IRC channels, P2P file sharing networks, etc.

The Trojan is easy to recognize once it has infected a computer, as when it is run it displays a message on-screen.

Foamer.A is a worm that tries to connect to a certain web page to download all sorts of files including malicious software. Another feature is that it disables the Windows Task Manager and Registry Editor and sends an email message to the creator with information about the affected computer, such as the user name and computer name.

On the other hand, if the user opens the CMD console, Foamer.A empties the screen, displays the message "THE WORLD-WIDE DONT ACCEPT COMMAND PROMPT!!!!" and then automatically closes it.

Foamer.A spreads across networks. This worm is difficult to recognize at a glance, as it displays no messages or warnings to alert of its presence.

Finally, Spamta.NB is an email worm aimed at spreading a Trojan called SpamtaLoad.BL. It does this by sending email messages with attachments that contain the Trojan.

These messages have variable subjects and message texts, as does the file that contains SpamtaLoad.BL. This Trojan downloads Spamta.NB on the system, so that cycle is repeated every time a computer is infected.



write your comments about the article :: © 2006 Computing News :: home page