Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    UK Government Warns of Massive Trojan Attack

    By
    Paul F. Roberts
    -
    June 16, 2005
    Share
    Facebook
    Twitter
    Linkedin

      A U.K. critical infrastructure monitoring group is warning public and private sector organizations about a wave of electronic attacks that have compromised critical networks in Britain with Trojan horse programs in recent months.

      The National Infrastructure Security Co-ordination Center, or NISCC, said on Thursday that it detected a series of e-mail attacks targeting U.K. companies and government agencies with Trojan programs that gather and transmit information to IP addresses in the Far East. Organizations that are part of the U.K. Critical National Infrastructure were advised to step up user education and detection measures to spot the Trojan programs, NISCC officials said.

      The group acknowledged that most of the attacks were on U.K. government institutions, but did not say whether any information was stolen. Private companies and even individuals may also have been targeted, NISCC officials said.

      “By providing information, practical help and advice, NISCC is working to enable organisations to take the steps needed to protect themselves and their data as best they can,” the U.K. Home Office said in an e-mail statement.

      The NISCC discovered 17 Trojan or remote monitoring programs within the last one or two months, according to Stuart Taylor, manager of Sophos plc. in the United Kingdom, which analyzed the programs for NISCC.

      The files submitted to Sophos included multiple variants of the Riler, Nethief and Dloader Trojans, which give remote users unauthorized access to compromised computers and allow them to open files and transmit them to remote servers.

      Around two thirds of the programs submitted by NISCC to Sophos were known Trojan programs. Others were previously undetected variants of known Trojan families, Taylor said.

      The programs were sent as attachments to e-mail messages that used so-called “social engineering” techniques such as faked sender addresses to trick the recipient into opening the attachment that installed the Trojan. In one case, the malicious program might also have been installed without user interaction using a software vulnerability in Microsoft Corp.s Windows DCOM (Distributed Component Object Model) RPC (Remote Procedure Call), he said.

      While Trojans are a common malicious payload on the Internet, there is evidence that the reported attacks were targeted, NISCC officials said.

      /zimages/6/28571.gifClick here to read about the growing threat of trojans.

      In some cases, the e-mail messages carrying the Trojan horse programs contained information about the job or interests of individuals at the victim organizations who handle commercially or economically sensitive data. For example, the messages were spoofed to appear to come from trusted contacts, news agencies or government agencies, to entice the recipients into opening the malicious attachment, according to NISCC.

      A machine or machines in Asia was set up to receive stolen information. However, those machines may have only been the first stop for any stolen data, and are not proof that groups or governments in that part of the world are responsible for the Trojan attacks, Taylor said.

      NISCC advised organizations that might be affected by the attack to harden their defenses against Trojan attacks by updating anti-virus definitions, applying software patches to vulnerable operating systems and educating users not to open suspicious attachments.

      In May, the Israeli newspaper Haaretz published news of a massive industrial espionage ring that used custom-designed Trojans to steal trade secrets and other sensitive information from leading companies.

      The two cases illustrate the growing threat to enterprises from Trojans, said Carole Theriault, security consultant at Sophos.

      Sophos researchers identify around 15 new Trojans a day that require immediate definition updates for Sophos products. That is three times the volume of Trojan horse programs researchers were seeing last year at this time, she said.

      It is possible that the agencies and companies affected were already using desktop or gateway anti-virus products, and that the Trojan variants eluded detection, Taylor said.

      “We see so many of them, some will get through,” Taylor said. “You just have to use good common sense when dealing with this problem. Its an unavoidable part of doing business.”´

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Paul F. Roberts
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×