Here’s how the trojan, currently detected as Trojan.Peskyspy, works:
"When the Trojan is executed, it injects a thread into the Skype process and hooks a number of API calls, allowing it to intercept all PCM audio data going between the Skype process and underlying audio devices.
Note: Since the Trojan listens to the data coming to and from the audio devices, it gathers the audio independently of any application-specific protocols or encryption applied by Skype when it passes voice data at the network level.
Note:
The incoming and outgoing audio data are stored in separate .mp3 files.
- The Trojan also opens a back door on the compromised computer, allowing an attacker to perform the following actions:
- - Send the .mp3 to a predetermined location
- - Download an updated version
- - Delete the Trojan from the compromised computer"
Rosemarie Grabowski
PC Security & Identity
Theft Protection
308 687 6085
topsecretfreereport.com/makeadifference-x
Three Steps You Need to Know to Stop Data Loss Varonis Sensitive data exposed to misuse or loss... it is the stuff of nightmares ... Download Now
No comments:
Post a Comment