Skip to main content

Trojan programs improve attack methods

posted onNovember 6, 2001
by hitbsecnews

Source: Vnunet

Security watchers have warned that Trojan programs, feared for their ability to compromise a network and go unnoticed, are getting sneakier about sending data out of the network. Typically, Trojans sit on a compromised machine and wait for incoming connections to deliver instructions.

But this leaves a flaw in the Trojan's functionality: all unnecessary ports can be blocked so that incoming connections are dropped and the Trojan is rendered useless.

But Michael DeMaria, of Syracuse University Labs, said that a new method of Trojan programming is being used to get around port blocking and intrusion detection, by making an outbound connection to an already compromised machine using legitimate network traffic.

More at VNUNet.

Source

Tags

Networking

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th