Jump to content
Posted 02 October 2008 - 08:18 PM
Posted 02 October 2008 - 09:17 PM
The worm then spreads through removable storage devices by creating the following file and setting the attributes to hidden:
The worm also creates the following file so that it executes whenever the removable device is used on another computer:
The worm then opens a back door and allows a remote attacker to gain access to the compromised computer.
It may attempt to steal sensitive information from the compromised computer and send it to a remote attacker via email.
Posted 03 October 2008 - 11:46 AM
Posted 03 October 2008 - 11:57 AM
Posted 04 October 2008 - 09:44 AM
Posted 04 October 2008 - 10:01 AM
Posted 04 October 2008 - 06:01 PM
0 members, 0 guests, 0 anonymous users