Be careful when sending a batch of emails containing viruses to steal QQ

Source: Internet
Author: User

The Security Channel reminds you today that July 22, April 26 (this Thursday) is the day when CIH broke out. In particular, it reminds the majority of computer users to do a good job of anti-virus and immediately scan and kill viruses. Do not take CIH viruses lightly. First, do not use pirated software. Stick to genuine software, enable anti-virus software to monitor and upgrade the latest virus database in real time. Secondly, all software on the network, CD, and floppy disk should be checked with anti-virus software before installation or use. Be sure to install anti-virus software that can automatically clear viruses in the compressed package.

Among today's viruses, the "Cobo" variants, the "e" variants, the "downloader" variants, and the "QQ thieves" variants are worth noting.

The "Cobo" variant is a backdoor that uses vulnerabilities on infected computers to spread.

The "e" variant is a Web worm that uses a group of infected emails to spread.

The "QQ account theft" variant is a trojan virus that steals users' QQ accounts.

Virus name: Backdoor/Codbot. j

Chinese name: "Cobo" variant j

Virus length: 47616 bytes

Virus Type: Backdoor

Hazard level:★★

Affected Platforms: Win 9X/ME/NT/2000/XP/2003

The Backdoor/Codbot. j "Cobo" variant j is a Backdoor that uses vulnerabilities on infected computers to spread. After the "Cobo" variant j runs, it copies itself to the system directory. Modify the registry and create a service. Enable backdoors on TCP port 6556, connect to the specified site, listen for hacker commands, record users' keyboard and mouse operations, terminate specific processes, and download remote files. Enable specific ports and exploit Microsoft vulnerabilities to spread.

Virus name: I-Worm/BBEagle.mo

Chinese name: mo

Virus length: Variable

Virus Type: Network Worm

Hazard level:★★

Affected Platforms: Win 9X/ME/NT/2000/XP/2003

The I-Worm/BBEagle.mo "" variant mo is a Web Worm that uses a group of infected emails for transmission. After mo runs the variant, a copy of the worm is created on the infected computer. Modify the Registry to enable automatic startup. A false error image is displayed. Use rootkit Technology to hide itself and prevent being scanned and killed. Connect to the specified site, download a series of specified email addresses, and send Group emails with viruses. Terminate security-related processes, delete security-related files, and reduce security settings on infected computers.

  • 1
  • 2
  • Next Page
[Content navigation]
Page 1st: Be careful when sending a batch of emails containing viruses to steal QQ Page 2nd: Be careful when sending a batch of emails containing viruses to steal QQ

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.