Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet Security.ca and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!


A $1,000 Trojan crime-ware development kit...

Google

Add to del.icio.us     Digg this story Digg this

June 29, 2007

In the past two to three days, MIS directors and IT managers in organizations of all sizes have been warned of a wave of Trojans that can seriously harm their infrastructures. The red cautious flag sent from security firm Finjan follows some reports of an alleged $1,000 crime-ware development kit, including a Trojan, being sold to potential hackers.

Yuval Ben-Itzhak, chief technology officer at Finjan said "this trend severely highlights the alarming growth of crime-ware toolkits being sold to would-be hackers these days."

He added "such crime-ware is focusing on stealing sensitive business data and sending it back to criminals' servers over encrypted communication channels like SSL in order to go totally undetected."

Additionally, Finjan's MCRC (Malicious Code Research Center) pointed to the rapid growth of a new PRG Trojan variant, which it believes may have been developed using a similar crime-ware toolkit.

Such malware relays critical data collected during employees' online activity to hacker Web sites using an SSL-encrypted format.

Research done by Don Jackson of managed security firm SecureWorks even suggests that the PRG crime-ware has been modified using a Trojan development kit to listen for hacker commands on a special TCP/IP port.

These commands allow a would-be hacker to gain remote control of a compromised system.

Jackson's analysis of certain log files on the servers storing the stolen information found that the data was coming from corporate computer networks.

Add to del.icio.us     Digg this story Digg this

Source: Vnunet

Google


Save Internet Security.ca's URL to the list of your favorite web sites in your Web browser by clicking here.

Become an authorized reseller of Proxy Sentinel™ and Firewall Sentinel™. Do like the rest of our authorized resellers and have your clients benefit the important security features of our products and solutions, while increasing your sales at the same time. Click here for all the details.


You can link to the Internet Security web site as much as you like. Read our section on how your company can participate in our reciprocal link exchange program and increase your rankings in the major search engines such as
Google and all the others.

Click here to order your Proxy Sentinel™ Internet security server today!

Proxy Sentinel™ is the most secure Internet proxy server on the market today. Click here for more information.
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet Security.ca is listed in
Global Business Listing

| Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact |
Copyright © Internet Security.ca    Terms of use    Privacy agreement    Legal disclaimer