Home Uncategorized Storm Worm Attacks With Botnet

Storm Worm Attacks With Botnet

0
Storm Worm Attacks With Botnet
Storm Worm Attacks With Botnet

A large-scale, new Trojan, which many home PC users thought to be infected, took action over the weekend and made all security and antivirus companies seriously consider the worm’s name (Strom worm)..

F-Secure, a Finnish computer security company, has warned that hackers using up-to-date news, such as hurricane news in Europe, to spread viruses have infected thousands of computers around the world.. “Strom Worm” named the famous antivirus firm F-secure, The trojan, which first started to spread in Europe on Friday, over the weekend, the worm attack spread to Europe from 6 branches, besides the weather, the worm also started to go to its victims as e-mails with current news. “230 people died in the storm that hit”, China’s satellite-dropping missile test and e-mail news telling that Fidel Castro is dead. Of course, when the user sees this news and downloads the news to his computer, the worm becomes active.

According to F-secure, each new wave of Emails carried different versions of the Trojan,. The fact that each Trogen changes shape and its ability develops each time has alarmed antivirus companies.

F-Secure company manager Mikko Hypponen explained that the malicious people who made the trogen are constantly developing this trogen”. Mikko Hypponen also sent the same mail to other users registered in the address book on the machine where this trojan is active, and said that it started to spread on those machines as well, but that this would affect more home users, not companies.

For now. There is no antivirus software on the market that can completely clean the trojan, so security companies warn users not to open incoming mails without knowing the source. it opens a backdoor, to be controlled remotely, it is a bo that hides the malicious program. creates a net. The infected machine becomes a zombie in a network summoned to the botnet. Many zombie machines are attacking the targeted machine at the same time and this process is of course controlled from a center. Thus, the person who carried out the attack can easily lose track of it.

Now, many of our friends have some question marks about what a botnet is. I guess let’s explain it, the first three letters of botnet will be more familiar, I hope this is the administrative identity used by the officials who manage the channels we chat with in the mirc program.. Of course it is also a control program for irc services. Now, since it will take too long to explain this event here, I promise you that I will include this subject in my next article.. But if you research this bot net incident, you will already learn a lot of information.

Written by Samet Aşar
Source : Sharerız.Biz Forums — Teakolik.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here