![]() Home users with unpatched systems and out-of-date anti-virus software will be at greatest risk. The majority of the infections appeared to come from home user broadband connections and from colleges and universities in the United States and the Asia-Pacific region. ![]() Most major anti-virus products are capable of detecting Phatbot, if kept up-to-date with the latest virus signatures, prior to an attack. ![]() It also attempts to disable security applications, including tools used to update anti-virus and other security software. When Phatbot infects a system, it searches for passwords that are stored on hard drives and those that are traveling on local area networks. Phatbot allows the attacker to gain control over infected computers and link them into P2P networks that can then be used to send large amounts of spam e-mail messages, flood web sites with data in an attempt to create a denial of service (DoS) condition, or to perform other unauthorized activities. (Phatbot does not appear to use e-mail for propagation.) government, are monitoring the emergence of PhatBot, a new, sophisticated hacker program that is capable of infecting systems by a variety of methods, such as through network security flaws in Microsoft's Windows operating system, peer-to-peer networks, and backdoors installed by the recent "Mydoom" and "Bagle" Internet worms. Computer security experts, in both the private sector and U.S.
0 Comments
Leave a Reply. |