Personal Tech Pipeline | Meet The Worm Of The Future

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

May 27, 2005

Meet The Worm Of The Future



Courtesy of TechWeb News

A new worm that hit users this week is a perfect example of the future of malicious code, said Panda Software Friday. And that future looks ominous.

The worm, dubbed "Eyeveg.d" by Panda (but Bugbear.b by Sophos, Lanieca.b by Symantec) is a sophisticated hybrid that spreads like a worm but conducts Trojan-style actions against the compromised computer.

Eyeveg.d infects a PC using an .exe file, a typical tactic of worms, and spreads itself to other machines by hijacking e-mail addresses and mailing itself to others.

The second, Trojan horse, component kicks in next, as Eyeveg.d loads a .dll file as a plug-in to the Internet Explorer browser. The .dll, essentially a keylogger, captures keystrokes whenever the computer's user sends data to an SSL server, such as those used by banking and e-commerce sites.

"This is just another example of phishing, through which Eyeveg.d can gather data such as bank account numbers, passwords, or credit card numbers," said Panda.

The Trojan also includes a backdoor, through which the hacker can send new commands or install more malicious software on the system.

"This type of hybrid of two malware species is becoming more and more habitual, as malware creators look for increased capacities and versatility in their creations," concluded Panda.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

ibm.com Business sale
through March 31 save 10% on select IBM eServer� IntelliStation� and xSeries� Express models, 5% on select warranty products, 10% on IBM Certified Used Equipment including notebooks and desktops and 70% on Storage Enterprise Server (2105-800P)

Save Big On IBM Certified Used Equipment
IBM Quality at a fraction of the price of new! IBM Certified Used Equipment provides access to a broad selection of used IBM systems, upgrades and features, including newer equipment. All systems are factory-refurbished with a 3-month guarantee.

Buy, Sell or Rent Used Cisco Equip-Save up to 85%
Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.

Flexible Anti-Spam Solution - CanIt-PRO
Stop spam on your terms with CanIt-PRO, the most flexible and customizable anti-spam solution available for the mail server. Offers per-user or per-group controls and is available as software or hardware appliance.


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
Stellent eSeminar "Approaches to Metadata Design" on March 23
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia