Drive-By Trojan Downloader Compromises Security

One of my collegues sent a link to a BBC article about the Sinowal Trojan horse , which is also known as Torpig and Mebroot. This trojan installs itself on victims’ computers when they simply visit certain web sites, and collects banking and credit card information and reports back to the what appear to be eastern European and Russian criminal gangs, such as the Russin Business Network. Links to the article are here.

Your best form of protection is to be running a broad spectrum Internet Security Suite, such as AVG, ZoneAlarm, or Norton, that has a paid for subscription and up-to-date virus and spyware definitions. Using Internet Explorer 7 also adds a level for protection from known mailicious sites and phishing sites. If you are running Windows Vista, the User Account Control feature should also offer a measure of protection.

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.