[ubuntu-uk] Successful simple trojan hit gnome-look
James Milligan
lists at lake54.com
Wed Dec 9 18:27:19 GMT 2009
On 09/12/2009 18:25, Johnathon Tinsley wrote:
> Matthew Wild wrote:
>
>> 2009/12/9 Andrew Drapper<andrew at drapper.com>:
>>
>>> It may not be the same as a sandbox, but what about installing software that
>>> you are not sure about in a virtual ubuntu inside you main ubuntu say
>>> using virtualbox?
>>>
>>>
>> This particular malware did nothing (so far) to the host machine, it
>> simply used it (and collectively all the other machines it was
>> installed on) to flood another server. Basically a primitive (yet
>> effective) botnet. In this respect, if the virtual machine had network
>> access, the malware would work still, it just wouldn't have the
>> potential to harm *your* computer.
>>
>>
> It wouldn't be hard to make this more effective either. The really scary
> trojan *(whose name eludes me right now)*, managed to use effective
> algorithmically generated domain names for its update download location.
> And you can hide the packages files, even corrupt the debian packaging
> system to stop it from knowing about all the files you've installed...
>
>
Are you referring to the Windows one, Conficker?
James
More information about the ubuntu-uk
mailing list