The so-called "villains outsmart", security manufacturers and virus manufacturers struggle for a day never stop. Internet age, the threshold of virus production gradually reduced, massive trojans, viruses flooded the network, the traditional anti-virus engine has been unable to deal with, so "cloud security" this emerging technology emerged. However, recently, Jinshan Network Security Center has captured a "cloud security" of the new Trojan horse-Tiger Trojan.
December 3, Jinshan Network Security Center issued a virus security warning, a "tiger" Trojan discovered the network, its biggest feature is through a variety of means and cloud security technology confrontation. According to the introduction, the Trojan mainly borrow "Bohu high-definition audio and video" player transmission, the user recruit, there will be no obvious "poisoning phenomenon." However, hackers will control the user's computer through the Trojan, access to the designated advertising page, thereby obtaining illegal benefits. Jinshan Network Security Center data show that as of December 2, 123365 computers have been infected. At present, Jinshan Guardian (http://www.ijinshan.com/) Download protection function can intercept the "Tiger Trojan" invasion.
Jinshan Network security Engineer Tiejun said, "Tiger Trojan transmission means and not many" creative "is currently more popular" seo+ pornographic website "means. That is, first of all through some hot words or pornography, such as "Laughing Lake" "passion small film" and so on, to attract users to malicious pages. It then lures the user to download the Bohu HD Audio player by using the name "private player" that must be downloaded. However, the Trojan is hidden in this so-called dedicated player. After the user recruit, generally difficult to find. Because it will not delete your hard disk files, even will not pop-up malicious Web pages. But in the background secretly control the user's computer, access to the hacker designated advertising page, thereby obtaining illegal benefits.
"The scary thing about this trojan is that it can fight cloud security technology." Tiejun said Tiger Trojan against cloud security technology means there are three kinds: first, shielding the security Vendors Cloud server IP address; second, by installing NDIS driver, the organization security software Cloud security server to transmit data, third, through SPI tamper with cloud security data, destroy virus sample upload. At present, the Golden Hill Guardian's Download protection function can intercept the invasion of Tiger Trojan, has "recruit" the user also need not worry, can use Jinshan first aid box to repair.
"The confrontation between security vendors and Trojans is actually a confrontation between people," says Fu, CEO of Jinshan Network. In the security company anti-virus technology continues to improve, in fact, the virus gangs are also constantly improving the production of virus Trojan technology, this time to combat cloud security technology, "Tiger Trojan" is a good example. Because of the huge economic interests behind the drive, Trojan virus began to group, systematic, industrialized form of operation, which also in the "one-man battle" of the major security manufacturers feel great pressure. Fu said the harsh Internet security situation required a radical overhaul of security companies. So, Jinshan network in recently launched the Golden Hill Guardian Open source plan, and announced that the Golden Hill bodyguard full open source, any third-party manufacturers or individuals are free to download and use the Golden Hill Guardian source code, from "Security to become an Internet people's war."