This story is interesting because it shows just how powerful a Trojan Horse program can be. Trojans make up over two-thirds of all malware infections, and the reason is that Trojan Horse programs are small, easy to conceal in another program like a game, or easy to install using a drive-by download from a compromised web site. These programs allow the attacker to remotely access and control the computer at a later date, and install other malware applications such as spam mailing software, password cracking software, key loggers, and to do other things such as turning on your web cam, and watching and/or recording whatever happens in the field of view.
As reported in TechDirt Daily, AVG was in the process of reviewing the code of a Trojan Horse, when the author opened a chat window, which was a feature of his malware, and asked them what they were doing.
Hacker: What are you doing? Why are you researching my Trojan?
Hacker: What do you want from it?
As you can see, the malware author is Chinese, which is not a surprise to those of us working the computer security field. China is the world leader in malware writing at the moment. The Chinese (government?) are hacking everything they can and transferring as much proprietary, industrial, military, and scientific research information that they can lay their hands on.
The amusing and somewhat scary part of this exchange was that the malware writer shut down the AVG research lab’s computer at the end of the chat session.Share