Results 1 to 4 of 4

Thread: Trojan(trojan.peskyspy) Attacks Skype on Windows

  1. #1
    mkasikandar's Avatar
    mkasikandar is offline Senior Member+
    Last Online
    6th May 2015 @ 02:27 PM
    Join Date
    14 Nov 2006
    Location
    »-(¯`v´¯)-» Hujra »-(¯`v´¯)-»
    Posts
    4,003
    Threads
    119
    Credits
    980
    Thanked
    50

    Lightbulb Trojan(trojan.peskyspy) Attacks Skype on Windows

    A new Trojan is recording Skype phone calls on Windows PCs, security research firm Symantec (NASDAQ: SYMC) reported today.
    "What we're looking at is something that could be considered the first 'wiretap Trojan,'" Symantec's Intel Security Team.


    Symantec's analysis found that the Trojan, which it dubbed "Trojan.Peskyspy," can record audio on a computer such as Skype calls, store the file locally as an encrypted mp3 and then relay it back to the hacker.



    Trojan.Peskyspy is designed to beat Skype's encryption, Symantec found. "Since the Trojan listens to the data coming to and from the audio devices, it gathers the audio independently of any application-specific protocols or encryption applied by Skype when it passes voice data at the network level," the company said.



    The virus can attack the Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003 and Windows 2000 operating systems.



    The Trojan does not exploit a Windows flaw, a Microsoft spokesperson told InternetNews.com. "Trojan.Peskyspy does not exploit any security vulnerability, but rather relies on user interaction in which the user would need to install/execute an application."



    To avoid Trojans, "users should exercise caution with e-mail and attachments received from unknown sources, or received unexpectedly from known sources. Equally important, users should avoid visiting un-trusted websites as they could possibly be malicious in nature prompting one to download and run a dangerous executable,"

  2. #2
    mkasikandar's Avatar
    mkasikandar is offline Senior Member+
    Last Online
    6th May 2015 @ 02:27 PM
    Join Date
    14 Nov 2006
    Location
    »-(¯`v´¯)-» Hujra »-(¯`v´¯)-»
    Posts
    4,003
    Threads
    119
    Credits
    980
    Thanked
    50

    Default Altering an applications behavior

    Altering an applications behavior

    "The Trojan is targeting Windows API hooks, a technique used to alter the planned behavior of an application, that Microsoft has intended to be used by audio applications," Symantec said.



    On infected systems, it attempts to bypass certain firewall processes, potentially opening up a limited back door that would allow the attacker to send the recorded calls to a predetermined location, download an updated version of the Trojan, and delete the Trojan from the compromised computer, according to Symantec.



    While the Trojan appeared to initially target Skype calls, Symantec's Intel Security Team said that this attack could work against any popular VoIP application.



    "We'd like to point out that its existence isn't due to any problems with Skype itself," the researchers said. "In this case, Skype has simply become a victim of its own popularity, most likely being targeted simply because it has such a large install base. This threat could just have easily been crafted to take advantage of any one of the myriad of other VoIP applications, and it's likely we'll see other threats in the future that do just that."



    Microsoft and eBay, Skype's parent company, did not immediately respond to requests for comment on the Trojan.


    Symantec said that the Trojan is more of a proof of concept than an immediate threat. Anyone with current anti-virus protection will be safe, and the Trojan is not designed to spread by itself.



    "In terms of impact, we don't see this threat gaining much of a foothold out in the wild," Symantec said. "What we've seen is largely proof-of-concept and does not contain any method to spread from one computer to another. However, it is possible that we will see variations on this Trojan theme in the future. With this in mind we recommend keeping your virus definition and IPS signatures up-to-date."



    "Someone has to install it themselves or use another piece of malware or social engineering to install it on a PC," Kevin Haley, director of Symantec Security Response, told InternetNews.com.



    Although the threat is minimal now, that could change. "It is common today for one piece of malware to install another piece of malware," Haley said.
    He added that most criminals don't have the time to sift through hundreds of thousands of mp3 files, so the Trojan would likely be used only in a targeted attack.

  3. #3
    mkasikandar's Avatar
    mkasikandar is offline Senior Member+
    Last Online
    6th May 2015 @ 02:27 PM
    Join Date
    14 Nov 2006
    Location
    »-(¯`v´¯)-» Hujra »-(¯`v´¯)-»
    Posts
    4,003
    Threads
    119
    Credits
    980
    Thanked
    50

    Default What enteprises need to consider




    Enterprise IT managers should therefore think about how valuable information is used on the phone in their own company.



    "They need to ask, 'is this a threat I've thought about? Do people want to target my call center? Do people want to target my executives? Are my executives aware of security best practices," said Haley.



    It's another case where an open architecture designed for the good guys is being taken advantage of by the bad guys, according to Haley. "The bad guys will always look to take advantage of things, in the real world as well as in the online world. This should reinforce to your readers that they should have security software on their computer."

  4. #4
    adnanncb is offline Member
    Last Online
    31st December 2012 @ 11:33 AM
    Join Date
    12 Feb 2009
    Age
    40
    Posts
    179
    Threads
    9
    Thanked
    0

    Default

    Bahi koi software batai key media player band kar ta ho to song chalta reheta ha koi bool rahi hai key yeh virus ha
    bahi koi advice dey please

Similar Threads

  1. trojan
    By oochaloa in forum Computer Articles
    Replies: 75
    Last Post: 31st January 2012, 12:51 AM
  2. Trojan Removers
    By JohnnyG in forum Ask an Expert
    Replies: 2
    Last Post: 30th June 2010, 01:01 PM
  3. Trojan
    By syedosamamanzar in forum Ask an Expert
    Replies: 4
    Last Post: 5th April 2010, 03:21 AM
  4. Trojan
    By uniquesandhia in forum Ask an Expert
    Replies: 9
    Last Post: 28th June 2009, 10:38 PM
  5. Trojan
    By shamsmahmood in forum Ask an Expert
    Replies: 5
    Last Post: 4th June 2009, 03:51 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •