|By Security News Desk||
|June 17, 2005 04:00 PM EDT||
The attackers' goal appears to be "covert gathering and transmitting of commercially or economically valuable information," the NISCC says. The e-mails include spoofed sender addresses "and information relevant to the recipient’s job or interests to entice them into opening the documents, the agency says.
Anti-virus software and firewall will not completely protect users from these attacks, as these trojans can use
common ports such as HTTP, DNS, and SSL, and can also be modified to
avoid anti-virus detection.
computer is under the control of the attacker and can be directed to carry
out any function normally only available to the system owner, and trojans
often communicate back to the attackers using standard application
ports (for example TCP port 80, used for web traffic), making it very difficult
to detect the data they send and receive amongst legitimate network traffic," the agnecy has warned.
The agency is working with other agencies worldwide to find and "neutralize" IP addresses that are known sources for the attacks. Meanwhile, it urges users to be vigilant in their detection and to follow a "current advice document" that it has posted, to be found at:
- "All It Took Was One E-Mail to Larry," Says Former eBay Research Director As He Moves to Google
- Google Ramps Up Its Mobile Reach: Launches "Mobile Web Search"
- Ericsson + Napster = World's First "Wireless Digital Music" Brand
- VoIP Update: Yahoo! Buys DialPad
- Free Guest Passes for the SOA World Conference & Expo in NYC
- SYS-CON i-Technology Podcast August 30, 2005
- A Flair for Food - Health-Conscious Cooking Is This Chef's Cup Of Tea
- Sony PSP May Feature Porn
- Kapow Helps Seiko UK, Provides SMS Text-Alert Services
- South Korea is World's Largest Phisher