[ubuntu-uk] Successful simple trojan hit gnome-look

James Milligan lists at lake54.com
Wed Dec 9 18:27:19 GMT 2009


On 09/12/2009 18:25, Johnathon Tinsley wrote:
> Matthew Wild wrote:
>    
>> 2009/12/9 Andrew Drapper<andrew at drapper.com>:
>>      
>>> It may not be the same as a sandbox, but what about installing software that
>>> you are not sure about in a virtual ubuntu inside you main ubuntu say
>>> using virtualbox?
>>>
>>>        
>> This particular malware did nothing (so far) to the host machine, it
>> simply used it (and collectively all the other machines it was
>> installed on) to flood another server. Basically a primitive (yet
>> effective) botnet. In this respect, if the virtual machine had network
>> access, the malware would work still, it just wouldn't have the
>> potential to harm *your* computer.
>>
>>      
> It wouldn't be hard to make this more effective either. The really scary
> trojan *(whose name eludes me right now)*, managed to use effective
> algorithmically generated domain names for its update download location.
> And you can hide the packages files, even corrupt the debian packaging
> system to stop it from knowing about all the files you've installed...
>
>    
Are you referring to the Windows one, Conficker?

James



More information about the ubuntu-uk mailing list