Trojan Alert Online is "fishing"

Source: Internet
Author: User
Tags mail modify win32 mail account

360 Security Center Released: This week, the Security Center to monitor the "fishing" site complaints are magnified trend, and the means of renovation, more secretive behavior. After investigation, in addition to the common use of similar web sites to entice users to log in and steal their passwords, using a message claiming to come from a major company, allowing you to click on a malicious web link to steal your password and other privacy information is also spreading. Experts remind, in the receipt of unknown mail must be carefully screened to prevent the recruit.

It is reported that the network "fishing" has always been a malicious means in the network, its various ways disguised as a regular network service providers to defraud the victim's account password and other privacy information. Phishing attacks through the way, can be said to be impossible, as long as you do not pay attention to click, the past may be a full of trojans or malicious code site. The difference induces you to enter your account information on a fake web page the traditional "fishing" means is a step closer to stealing information by clicking on it.

Recently, PayPal chief technology officer Scott Thompson said in an interview: "If you have an e-mail account, you may have encountered a claim from PayPal mail, visible phishing attacks are very common." Now many banks or securities businesses on the Internet are often related to e-mail addresses, and if phishing or identity-seekers get the e-mail addresses you use to register the business, that would be a scary thing.

Experts in this regard to the vast number of netizens:

First, the registration of online banking and other important business, it is best to use a separate mailbox, do not casually published.

Second, some companies will be digitally signed to check whether the sender of the mail, you need to upgrade the version of IE browser to identify verification, such as IE7 or firework.

Third, through the 360 guards to repair the system loophole, opens the real-time webpage to prevent the leak and the Fishing website interception function.

Be sure to open the URLs and emails you receive.

"Key Trojan Broadcast"

Trojan Name: Backdoor/win32.agent.ahj

Trojan Type: Backdoor Trojan

Harmful behavior: Trojan running after the derivation of virus files to the system directory, and delete itself, modify the registry, new services, and to serve the way to achieve the goal of random start.

Transmission channel: Network Transmission, U disk

Victims Group: 4.8 million

Trojan Name: TROJAN-PSW/WIN32.DELF.WH

Trojan Horse Type: Stolen Number Trojan

Harmful behavior: Steal information from the computer, including game account password, etc.

Transmission channel: Network communication

Victims Group: 880,000

Trojan Name: trojan/win32.agent

Trojan Type: Trojan Horse

Harmful behavior: Automatic to QQ friends to send virus files, and the size of the virus files, send the virus file name has a certain temptation

Transmission channel: Network communication

Victims Group: 450,000

Trojan Name: W32/FUBALCA.D

Trojan Type: Trojan Horse

Hazard Behavior: Modify registry, create process, inject virus code

Transmission channel: Network communication

Victims Group: 340,000

Trojan Name: Trojan/popwin

Trojan Type: Trojan Horse

Hazardous behavior: After the Trojan runs, modify the registry, to achieve the power-on from the startup. Timed pop-up advertisement window, interference user normal operation.

Transmission channel: Network communication

Victims Group: 300,000

Trojan Name: W32/pifio

Trojan Type: Trojan Horse

Hazardous behavior: Resident memory, variable virus. Infected EXE files, also through the mapping drive and network sharing spread.

Transmission channel: Network communication

Victims Group: 100,000

Trojan Name: Trojan/win32.onlinegames.ny

Trojan Type: Theft Trojan Hazard behavior: Trojan running after the derivation of Trojan files, steal user network game accounts and passwords.

Transmission channel: Network communication

Victims Group: 80,000

Trojan Name: TROJAN-DOWNLOADER/WIN32.SMALL.EWY/EJW

Trojan type: Trojan download

Harmful behavior: Automatic download, the virus runs automatically from the designated Web site to download the backdoor program to run.

Transmission channel: Network communication

Victims Group: 60,000

Please contact the site, timely note your name, contact email: Post@chinaz.com.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.