Peaches Posted October 29, 2010 Report Share Posted October 29, 2010 Oct26 The Malicious Intent of the "Here You Have" Mail Worm The "Here You Have" Payload: A Powerful Backdoor Not all backdoor applications are created equal. As such, it can be said that the cybercriminals behind WORM_MEYLE.B deliberately opted to use a BIFROSE backdoor program for several reasons. In our simulated environment, we saw that an attacker can use a BIFROSE variant to transfer files to and from an infected system, delete files, terminate processes, and steal sensitive information off an infected system such as the computer's name; lists of active users, processes, and windows; and serial keys, among others. It can also access and modify registry information, log and retrieve keystrokes, create a remote shell, issue commands that the infected user's shell can offer, and routinely capture and retrieve images of an affected user's screen Details & screenshots plus Part I & Part II - http://blog.trendmic...il-worm-part-2/ Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.