[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200510281528.j9SFSbYe005052@turing-police.cc.vt.edu>
Date: Fri Oct 28 16:28:54 2005
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: Re: Microsoft AntiSpyware falling further
behind
On Fri, 28 Oct 2005 17:56:32 +0300, Valdis Shkesters said:
(Hmm.. usually when I reply to Valdis I'm talking to myself... ;)
> As today I was preparing news for a portal on IT security,
> I am informed that Anti-Spyware Coalition is finalizing spyware
> definition. It is last moment to finalize with spyware, because
> at the horizon already has appeared ?crimeware?. Take a look
> at http://www.antiphishing.org/. I?m quoting: ?Technical subterfuge
> schemes plant crimeware onto PCs to steal credentials directly,
> often using Trojan keylogger spyware.?
> Maybe it would be better to call Trojan horses Trojan horses?
No, because they're different.
Trojan horses (a) get installed under pretense of being something wanted
or beneficial ("Hey, I'm a neat fun codec that lets you view these movies...")
and (b) once there, gives the attacker a "back door" into the system, to
do unspecified things (run commands, launch DDoS attacks, send spam, scan
for other vulnerable software, upload plugins to extend the Trojan's functionality,
or whatever).
Spyware, on the other hand (a) *may* be installed via Trojan Horse means, but may
also be forcibly inserted on a system via a software vulnerability, or added
in via the above-mentioned plugin method by an already-present Trojan, and (b) is
software that monitors system activity (keystrokes, screen pixmaps, etc) in an
effort to acquire credentials or other sensitive information.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051028/86e172da/attachment.bin
Powered by blists - more mailing lists