Security Researchers Terminate Sites Selling Trojans - InformationWeek
IoT
IoT
News
News
3/8/2006
12:01 PM
50%
50%
RELATED EVENTS
The Real Impact of a Data Security Breach
Aug 02, 2017
In this webcast, experts discuss the real losses associated with a breach, both in the data center ...Read More>>

Security Researchers Terminate Sites Selling Trojans

Several Web sites selling made-to-order Trojan horses to hackers reportedly have been shut down.

Several Web sites selling made-to-order Trojan horses to hackers have been shut down, the two cooperating security companies who led the investigation said Wednesday.

U.S.-based RSA Security and Spain's Panda Software collaborated in the effort to identify, locate, and shutter five sites. Three were marketing la carte Trojans for launching targeted identity theft attacks against users of specific financial institutions, while two were sites where the buyers could monitor the infections the malware caused.

Once installed on users' PCs, the Trojans would return data to the hackers, including systems' IP addresses and bank or brokerage passwords.

"The collaboration between RSA Security and Panda Software has been key to rapidly dismantling these dangerous Web sites for creating and selling targeted malware," said Luis Corrons, director of PandaLabs, in a statement.

Panda kicked off the investigation after it discovered a new Trojan, dubbed "Briz.a." Clues in Briz.a's code led Corrons' team to the scam; Panda then brought in RSA, which runs an around-the-clock anti-fraud center acquired during its December 2005 purchase of New York City-based Cyota. RSA contacted the ISPs hosting the sites to tell them that they were harboring illegal services.

"It is critical to have industry collaboration and knowledge sharing such as Panda and RSA demonstrated in this complex case," said Chris Young, senior vice president of RSA Cyota, in an accompanying statement.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll