Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Experts Warn of Growing Trojan Threat

    Written by

    Paul F. Roberts
    Published June 3, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Trojan horse programs were in the news again this week, as the Israeli newspaper Haaretz published news of a massive industrial espionage ring that used custom-designed Trojans to steal trade secrets and other sensitive information from leading companies.

      The case illustrates the growing threat to enterprises from surreptitious monitoring programs, which are increasingly being used in sophisticated and coordinated attacks. While news of virus and worm outbreaks still dominates the headlines, Trojans could be a silent epidemic affecting untold numbers of companies, according to one leading malicious code researcher.

      Authorities in Israel are expected to charge Michael Haephrati of London with writing the Trojan program that stole documents from one of the countrys leading car importers, as well as high technology and telecommunications firms. Private investigation firms are believed to have planted the Trojan, then pilfered documents from the companies computers, including customer lists, sensitive information on bids and corporate strategy documents, according to published reports.

      /zimages/4/28571.gifClick here to read why Larry Seltzer says to assume malware espionage is common.

      Security experts contacted by eWEEK agree that similar Trojans could be lurking on the networks of many companies without arousing suspicion.

      A recent, informal poll of companies by the SANS Institutes Internet Storm Center turned up a number of examples of spyware and Trojans that stole passwords and spied on e-mail traffic. The network administrators who contacted ISC typically found the programs by accident, said John Bambenek, a research programmer at the University of Illinois and ISC incident handler.

      Trojans and key loggers are now common components of worms and viruses, he said. Supplementing those elements with programs that search out and pilfer particular types of documents is a simple matter, he said.

      Recent evidence collected by researchers at Computer Associates International Inc. suggests that those behind Trojan programs are becoming more sophisticated in getting their wares onto vulnerable machines, also.

      Recent versions of the Glieder and Fantibag families of Trojan horse programs cooperate to infect vulnerable systems, according to Sam Curry, vice president of eTrust Security Management at CA.

      The staged attacks began with a flood of new Glieder variants—eight in 8 hours—which spread quickly between machines. The new variants strained anti-virus researchers, who had to create unique signatures for each new variant, giving the Trojan time to spread undetected.

      In the second stage of the attack, the Glieder variants opened a backdoor on infected systems that was used by the new variants of Fantibag, which cut off access to anti-virus update services and the Microsoft Windows update service. In the final stage of the attacks, a version of the Mitglieder Trojan was installed to channel network traffic through proxy servers run by the parties who launched the attack, Curry said.

      “These are new dimensions and degrees of coordination,” he said.

      The sheer volume of new Trojan programs could overwhelm enterprise anti-virus and perimeter protection systems, exposing companies or employees to identity theft, loss of intellectual property or even regulatory violations, Curry said.

      “The scary thing is that often the [support] calls are not there. There arent alarm bells going off. These systems are being abused, and people have no idea of what happened,” he said.

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Paul F. Roberts
      Paul F. Roberts

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.