About
Subscribe

Opening the cell backdoor

This week, Trojan horses wreak havoc, cellphone users get attacked, Symantec employees get laid off, new flaws appear and old ones get fixed.
By Ilva Pieterse, ITWeb contributor
Johannesburg, 30 Jun 2006

A clever SMS is doing the rounds, and is seen to be the first instance of a keylogger being spammed through a cellphone. The cellphone users receive a text message enticing them to type the link into their phone browser. If they do this, a keylogger Trojan is installed and the rest is history.

On to Kukudro - a Trojan which accounts for 35% of all malware reported to Sophos. This horse has been spammed out in large quantities and uses subject lines such as including "Worth to see", "Prices", and "Hello".

The mail comes attached with an infected Word document displaying information about Apple, Sony and HP laptops, which can lead to a hacker gaining access if opened.

Laid off

California-based Symantec is retrenching 80 of its employees for strategic purposes. The company will stop making hardware for Symantec Gateway (SGS), Symantec (SNS) 7100, and the SGS Advanced Manager 3.0 products.

Applications currently in the market, however, will continue to be sold and supported.

MS flaws

A clever SMS is doing the rounds, and is seen to be the first instance of a keylogger being spammed through a cellphone.

Ilva Pieterse, ITWeb contributor

A report notes that two new IE flaws have surfaced allowing attackers to bypass security restrictions and launch malicious commands.

The one flaw has to do with an origin validation error when handling the "object.documentElement.outerHTML" property, which could be exploited by remote attackers to read content and data served from another domain in the context of a malicious Web page.

The other flaw creates an error when browsing file shares, which attackers could exploit to trick a user into executing a malicious .hta file via a specially crafted Web page.

Apple fix

Apple has just released Mac OS X version 10.4.7 to address multiple security holes in the operating system.

The flaws included:

* An information disclosure vulnerability affecting the AFP server component.
* A stack-based buffer overflow vulnerability affecting ImageIO when viewing malformed .tiff images.
* A local format-string vulnerability, which affects the operating system`s logging facility and may be exploited by attackers to execute arbitrary code with elevated privileges.
* A denial-of-service vulnerability, which affects OpenLDAP.

Sources used: SearchSecurity, The Register, CA

Share