02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DOCID: 4046925<br />

UNCLASSIFIEDliFOR OFFICIAL ~SE ONLY<br />

"low" threat, it is significant because it marks <strong>the</strong> first time that malware has<br />

successfully infected both mobile devices and Windows-based cornputers.i?"<br />

Trojans are hard to detect because <strong>the</strong>y often use what are called "binder programs"<br />

to link <strong>the</strong>m with a legitimate program so that <strong>the</strong> Trojan will execute in <strong>the</strong><br />

background at <strong>the</strong> same time that <strong>the</strong> legitimate program runs, making <strong>the</strong> Trojan<br />

invisible to <strong>the</strong> victim.<br />

How can you tell if you have a Trojan on your computer? Some of <strong>the</strong> telltale signs<br />

are unexplained slow performance, a CD tray that mysteriously opens and closes<br />

randomly, inexplicable error messages, strange screen images, or <strong>the</strong> computer<br />

automatically rebooting itself. These are by no means <strong>the</strong> only symptoms and, in<br />

fact, <strong>the</strong>re may be no symptoms at all.<br />

Once <strong>the</strong> Trojan has started to run, it may communicate with its home base via<br />

email, by contacting a hidden Internet chat channel, or by using a predefined TCP<br />

port, providing <strong>the</strong> attacker with <strong>the</strong> computer's IP address. Once activated, <strong>the</strong><br />

Trojan can <strong>the</strong>n be instructed to do many things, such as formatting a hard drive,<br />

sending back financial data, attacking ano<strong>the</strong>r computer, or participating in a<br />

Distributed Denial of Service (aka "zombie") attack against a <strong>web</strong>site. It gets worse.<br />

Trojans may have <strong>the</strong> ability to capture keystrokes, meaning <strong>the</strong>y can ga<strong>the</strong>r<br />

absolutely any data on a victim's computer, including passwords, credit card<br />

numbers, personal communications, files-anything you have, <strong>the</strong>y have. Anything<br />

you do, <strong>the</strong>y can do. Anything you see, <strong>the</strong>y can see.<br />

So how do you find and eradicate <strong>the</strong>se vile vermin? First, understand that although<br />

good virus scanning software may detect and remove many Trojans, typical antivirus<br />

scanners may not detect Trojans. That's because Trojans use techniques to<br />

hide <strong>the</strong>mselves. How <strong>the</strong>n can you find out if you have a Trojan? A major clue to a<br />

Trojan infection is an unexpected open IP port, especially if <strong>the</strong> port number<br />

matches a known Trojan port. How do you find out which IP ports are open on your<br />

computer? It's easy: use <strong>the</strong> netstat utility that comes with many operating systems,<br />

including Windows. Here's how on a Windows computer:<br />

1. disconnect <strong>the</strong> computer from <strong>the</strong> Internet<br />

2. using Task List, close all programs that connect to <strong>the</strong> Internet (e.g., email,<br />

1M)<br />

3. close all open programs running in <strong>the</strong> system tray<br />

209 Robert McMillan, "Mobile Trojan Horse Trots onto PCs," lOG News Service, PCWorld.com, 22<br />

September 2005, ..::http://www.Dcworld.com/news/article/0.aid.122658.OO.asp> (14 November 2006).<br />

UNCLASSIFIEDflIiO~ OlililelAL tJSE ONLY 589

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!