Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Thursday February 26 2015, @03:56PM   Printer-friendly
from the stomp-stomp-stomp dept.

European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.

Ramnit started out in 2010 as a computer worm capable of infecting EXE, DLL, HTM, and HTML files. However, over time it evolved into an information-stealing Trojan that’s distributed in a variety of ways.

Ramnit is capable of hijacking online banking sessions, stealing session cookies which can then be used to access accounts on various sites, copying sensitive files from hard drives, giving attackers remote access to infected computers and more.

Researchers from antivirus vendor Symantec described the malware program as “a fully-featured cybercrime tool” in a blog post Wednesday ( http://www.symantec.com/connect/blogs/ramnit-cybercrime-group-hit-major-law-enforcement-operation ) and said that it infected over 3.2 million computers over its five years of existence.

http://www.pcworld.com/article/2889092/europol-and-security-vendors-disrupt-massive-ramnit-botnet.html

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Thursday February 26 2015, @10:42PM

    by Anonymous Coward on Thursday February 26 2015, @10:42PM (#150174)

    ((char)60)script type="text/javascript">nasty_shit((char)60)/script>?

    speaking of which how to I escape LEFT_ANGLE_BRACKET?

  • (Score: 2) by francois.barbier on Friday February 27 2015, @12:21AM

    by francois.barbier (651) on Friday February 27 2015, @12:21AM (#150222)

    Right, but that's HTML injection. More precisely JavaScript injection. Not infection.
    This still needs a bad browser (educated guess: IE? ActiveX?) to load it. And the browser to allow the download, then execution, and so on.
    An infected EXE just runs and infects everything else. Firmware included.
    I know I'm being pedantic but an HTML infection would really have impressed me.
    This? Meh. Banal MS virus.
    By the way, use HTML entities: "&lt;tag&gt;" => "<tag>"