Trojan and Email Forging Guide
Trojan and Email Forging Guide
1) Introduction To Trojan&viruses:
A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware
program containing malicious code that, when executed, carries out actions determined by the
nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term
is derived from the story of the wooden horse used to trick defenders of Troy into taking
concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a
form of social engineering, presenting themselves as routine, useful, or interesting in order to
persuade victims to install them on their computers. [1][2][3][4][5]
A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized
access to the affected computer.[6] While Trojans and backdoors are not easily detectable by
themselves, computers may appear to run slower due to heavy processor or network usage.
Malicious programs are classified as Trojans if they do not attempt to inject themselves into
other files (computer virus) or otherwise propagate themselves (worm).[7] A computer may host a
Trojan via a malicious program a user is duped into executing (often an e-mail attachment
disguised to be unsuspicious, e.g., a routine form to be filled in) or by drive-by download.
What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to
another, leaving infections as it travels. Like a human virus, a computer virus can range in
severity: some may cause only mildly annoying effects while others can damage your hardware,
software or files. Almost all viruses are attached to an executable file, which means the virus
may exist on your computer but it actually cannot infect your computer unless you run or open
the malicious program. It is important to note that a virus cannot be spread without a human
action, (such as running an infected program) to keep it going. Because a virus is spread by
human action people will unknowingly continue the spread of a computer virus by sharing
infecting files or sending emails with viruses as attachments in the email.
What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms
spread from computer to computer, but unlike a virus, it has the capability to travel without any
human action. A worm takes advantage of file or information transport features on your system,
which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than
your computer sending out a single worm, it could send out hundreds or thousands of copies of
itself, creating a huge devastating effect. One example would be for a worm to send a copy of
itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself
out to everyone listed in each of the receiver's address book, and the manifest continues on down
the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in
most cases is that the worm consumes too much system memory (or network bandwidth),
causing Web servers, network servers and individual computers to stop responding. In recent
worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to
tunnel into your system and allow malicious users to control your computer remotely.
cause harm to the infected system or network, they propagates using multiple methods, the attack
can come from multiple points, and blended threats also exploit vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport multiple attacks
in one payload. For example it wouldn't just launch a DoS attack it would also, for example,
install a backdoor and maybe even damage a local system in one shot. Additionally, blended
threats are designed to use multiple modes of transport. So, while a worm may travel and spread
through e-mail, a single blended threat could use multiple routes including e-mail, IRC and filesharing sharing networks.
Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do
multiple malicious acts, like modify your exe files, HTML files and registry keys at the same
time basically it can cause damage within several areas of your network at one time.
Blended threats are considered to be the worst risk to security since the inception of viruses, as
most blended threats also require no human intervention to propagate
Using infected computer as proxy for illegal activities and attacks on other computers.
Trojan horses in this way may require interaction with a malicious controller (not
necessarily distributing the Trojan horse) to fulfill their purpose. It is possible for those
involved with Trojans to scan computers on a network to locate any with a Trojan horse
installed, which the hacker can then control. [8]
Some Trojans take advantage of a security flaw in older versions of Internet Explorer and
Google Chrome to use the host computer as an anonymizer proxy to effectively hide
Internet usage,[9] enabling the controller to use the Internet for illegal purposes while all
potentially incriminating evidence indicates the infected computer or its IP address. The
host's computer may or may not show the internet history of the sites viewed using the
computer as a proxy. The first generation of anonymizer Trojan horses tended to leave
their tracks in the page view histories of the host computer. Later generations of the
Trojan horse tend to "cover" their tracks more efficiently. Several versions of Sub7 have
been widely circulated in the US and Europe and became the most widely distributed
examples of this type of Trojan horse. [8]
In German-speaking countries, spyware used or made by the government is sometimes
called govware. Govware is typically a trojan horse software used to intercept
communications from the target computer. Some countries like Switzerland and Germany
have a legal framework governing the use of such software.[10][11] Examples of govware
trojans include the Swiss MiniPanzer and MegaPanzer[12] and the German "state trojan"
nicknamed R2D2.[10]
Due to the popularity of botnets among hackers and the availability of advertising
services that permit authors to violate their users' privacy, Trojan horses are becoming
more common. According to a survey conducted by BitDefender from January to June
2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global
malware detected in the world." Trojans have a relationship with worms, as they spread
with the help given by worms and travel across the internet with them. [13]
The anti-virus company BitDefender has stated that approximately 15% of computers are
members of a botnet, usually recruited by a Trojan infection.
A Trojan virus will normally consist of a server and client component. The client component is
the portion of the malware that infects the end-users computer. Once established or executed,
the virus can be designed to establish a certain level of control over the infected computer. Based
on the desired purpose of the malware author, the client Trojan can deliver additional malware
components such as a key logger, spyware, or perform destructive features on the computer.
A remote access Trojan virus remains the most encountered Trojan in the wild. This virus will
give the hacker/attacker full control over the targeted computer equivalent to the users
permissions. Once access is gained to the computer, the hacker can then access any personal
information the user has stored on their computer to include logins, passwords, credit card
numbers, financial statements, and other personal information. Many times, this information can
then be used to steal the individuals identity or to apply for credit card/banking information in
the persons name.
to infect as many computers as possible while sending potentially malicious emails to all
addresses found on the targeted machines.
often as payload of a Trojan horse, and will try to hide its operation from the victim and from
security software.
The operator controls the RAT through a network connection. Such tools provide an operator the
following capabilities:[1]
Its primary function is for one computer operator to gain access to remote PCs. One computer
will run the "client" software application, while the other computer(s) operate as the "host(s)".
A well-designed RAT will allow the operator the ability to do anything that they could do with
physical access to the machine. Some RAT trojans are pranks that are most likely being
controlled by a friend or enemy on April Fool's Day or a holiday. Prank RATs are generally not
harmful, and won't log keystrokes or store information about the system on the computer. They
usually do disruptive things like flip the screen upside-down, open the CD-ROM tray, or swap
mouse buttons.
Back Orifice
NetBus
iControl
Sub Seven
Beast Trojan
Bifrost[7]
Blackshades[8][9]
Darkcomet[10][11]
LANfiltrator[12]
Xi Rat
Optix Pro
ProRat
Pandora Rat
ESEA's anti-cheat software
For a fascinating "how I became a hacker" biography interview, please see The Rise and Fall of
xVisceral which details how as a 17 year old Halo player, xVisceral first was introduced to
hacking as a way to cheat other Halo players, and a detailed history of how this led to ever-moreadvanced hacking tools and ultimately the creation of Blackshades. (the original source is
currently unavailable, this is an archived copy of an article from:
The Charges against Hogue (filed January 9, 2013) say that "Michael Hogue a/k/a xVisceral, the
defendant, and others known and unknown, willfully and knowingly combined, conspired,
confederated, and agreed together and with each other to engage in computer hacking in
violation of Title 18, USC, Section 1030(a)(5)(A)." It was part of the conspiracy that Hogue and
others "did cause the transmission of a program, information, code and command, and as a result
of such conduct, wouuld and did intentionally cause damage without authorization, to a protected
computer, which would and did cause damage affecting 10 and more protected computers during
a one-year period, in violation of Title 18, USC Sections 1030(a)(5)(A), 1030(c)(4)(B)(i), and
(c)(4)(A)(i)(VI), to wit, HOGUES used malware to infect computers and sold that malware to
others, enabling them to infect and remotely control victims' computers."
Like most RATs, once a victim has been tricked into clicking on the installer, the RAT is
controlled by connecting to a server used for that purpose. The FBI was able to learn
considerably more about the person being described as the "co-creator" of BlackShades, Alex
YCEL, (also spelled Alex Yucel, Alex Yucle, Alex Yuecel), AKA marjinz, AKA Victor
Soltan, by tracking one of his servers. As they investigated the various domains used to host the
servers for the malware. In one case, Alex contacted a company to lease certain computers for
this purpose (November 8, 2012) paying for them on January 30, 2013. On March 18, 2013, he
sent email requesting tech support due to a problem with his servers. Alex was the administrator
of "www.blackshades.ru" and "www.bshades.eu". Alex is a 24 year old citizen of Sweden,
arrested in Moldova and awaiting extradition to the United States.
Step 11 If you were not running a commercial antivirus program prior to the Trojan virus
infection, consider purchasing one from Malwarebytes, Avast, AVG, Norton, or McAfee to
prevent future infections.
Malwaresoftware written to infect private computers and commit crimes such as fraud and
identity thefthas become big business in the cyber underworld. As a result, if you use a
computer for web surfing, shopping, banking, email, instant messaging, and gaming without
proper protection, you are putting yourself at high risk of being victimized.
By exploiting vulnerabilities in operating systems and browsers, malware can sneak malicious
Trojan horse programs onto unsecured PCs. Unsuspecting and unprotected users can also
download Trojans, thinking they are legitimate game, music player, movie, and greeting card
files. Trojans can also lurk in files shared between friends, family, and coworkers using peer-topeer file sharing networks.
Trojans have traditionally hidden in worms and viruses spread by email, but theyre increasingly
showing up in instant messages and onPDAs and cell phones. Organized crime rings have
devised insidious new ways of delivering Trojans, and consumers must stay informed of the
latest tricks. Protection against these multi-faceted attacks requires integrated anti-virus, firewall,
and anti-spyware technologies. Below are the top 10 things you need to know to protect yourself
against malware and Trojan attacks.
Today, Trojans can be spread by browser drive-bys, where the program is downloaded in the
background when you simply surf to a rigged web site. Shell code runs a Trojan that downloads
additional payload code over HTTPvarious forms of bots, spyware, back doors, and other
Trojan programs. Hackers then send phishing emails to lure users to web sites, where
unsuspecting victims are tricked into revealing personal information. Hackers can also exploit
security weaknesses on sites, and then piggyback their Trojans onto legitimate software to be
downloaded by trusting consumers.
How Does My PC Get a Trojan?
Peer-to-peer (P2P) networking has become a launching pad for viruses. Attackers incorporate
spyware, viruses, Trojan horses, and worms into their free downloads. One of the most
dangerous features of many P2P programs is the browse host feature that allows others to
directly connect to your computer and browse through file shares.
P2P can accidentally give access to logins, user IDs and passwords; Quicken files and credit
reports; personal information such as letters, chat logs, cookies, and emails; and medical records
you accidentally house in accessible folders on your PC. As with email and instant messages,
viruses in P2P files are capable of weaving their way through as many users as they can, stealing
information and delivering it to cyber criminals who forge identities and commit fraud.
Top 10 Ways to Defend Against Malware and Trojans
Although hackers never stop developing new tricks to commit fraud and steal identities,
consumers can take proactive steps to safeguard their systems. All it takes is a combination of
robust security software and a commitment to following basic safety rules.
1. Protect your computer with strong security software and make sure to keep it up to date. The
McAfee Internet Security guarantees trusted PC protection from Trojans, hackers, spyware,
and more. Its integrated anti-virus, anti-spyware, firewall, anti-spam, anti-phishing, and backup
technologies work together to combat todays advanced multi-faceted attacks. It scans disks,
email attachments, files downloaded from the web, and documents generated by word
processing and spreadsheet programs.
2. Use a security-conscious Internet service provider (ISP) that implements strong anti-spam and
anti-phishing procedures. For example, AOL blocks known phishing sites so that customers cant
reach them. The SpamHaus organization lists the current top 10 worst ISPs in this category.
Consider this when making your choice.
3. Enable automatic Windows updates or download Microsoft updates regularly to keep your
operating system patched against known vulnerabilities. Install patches from other software
manufacturers as soon as they are distributed. A fully patched computer behind a firewall is the
best defense against Trojan and spyware installation.
4. Use extreme caution when opening attachments. Configure your anti-virus software to
automatically scan all email and instant message attachments. Make sure your email program
doesnt automatically open attachments or automatically render graphics, and ensure that the
preview pane is turned off. This will prevent macros from executing. Refer to your programs
5.
6.
7.
8.
9.
10.
safety options or preferences menu for instructions. Never open unsolicited business emails, or
attachments that youre not expectingeven from people you know.
Be careful when engaging in peer-to-peer (P2P) file-sharing. Trojans sit within file sharing
programs waiting to be downloaded. Use the same precautions when downloading shared files
that you do for email and IM. Avoid downloading files with the extensions .exe, .scr, .lnk, .bat,
.vbs, .dll, .bin, and .cmd. Anti-virus software and a good firewall will protect your system from
malicious files.
Download the latest version of your browser to ensure that it is also fully updated and utilizes
the latest technologies to identify and filter out phishing sites that can install Trojans.
Use security precautions for your PDA, cell phone, and Wi-Fi devices. Trojans arrive as an
email/IM attachment, are downloaded from the Internet, or are uploaded along with other data
from a desktop. Cell phone viruses are in their infancy, but will become more common as more
people buy phones with advanced features. Anti-virus software is available for PDAs and cell
phones. McAfee also offers trusted security solutions for Wi-Fi.
Configure your instant messaging application correctly. Make sure it does not open
automatically when you fire up your computer. Turn off your computer and disconnect the DSL
or modem line when youre not using it. Beware of spam-based phishing schemesdont click
links in emails or IM.
Be certain a web site is legitimate before you go there. Use software that automatically checks
this, such as AccountGuard from eBay and ScamBlocker from Earthlink. You can also check the
validity of individual web addresses (URLs) with a WHOIS search such as www.DNSstuff.com.
Back up your files regularly and store the backups somewhere besides your PC. If you fall victim
to a Trojan attack, you can recover your photos, music, movies, and personal information like
tax returns and bank statements. McAfee PC Protection Plus provides essential protection from
viruses, spyware, and hackers along with automatic backups of your hard drive.
A Trojan virus is a piece of software designed to look like a useful file or software program but
performs a possibly nefarious function once installed on a client computer. The virus takes its
name from the Trojan Horse from Greek mythology setup outside of the city of Troy. Trojan
horse viruses differ from other computer viruses in that they are not designed to spread
themselves. Instead Trojan horse malware is either delivered as the payload of another virus or
piece of malware or through manual end-user action by downloading infected files or inserting
infected drives into a computer. Once a computer is infected with a Trojan virus, the malware
can be designed to steal end-user information, perform destructive harm on the target computer,
or even download additional computer malware. Trojan horse viruses comprised more than 80%
of all computer malware detected in the world over the past year and the number continues to
grow.
Report about the Spoofed mails to your Internet Service provider and notify them through
Email.
Change your password immediately for all your other email accounts.
Enable Sender filtering
Enable recipient filtering
Further do not respond to any mails which have personal information from the forged Mail ID
Add and update the block list regularly with the spammers, either their domain name or their
email addresses
Download Exchange tools and RUN it to make sure your server is safe and healthy
Stick to the following rules to prevent your system from Spoofing attacks:
Always keep your computer system updated with a good anti virus software
Do not open the mail if you do not recognize the sender.
Ignore any mails with comes without sender names
Ignore any mail which has your name in the sender details
Do not open any mails if it has only a link in the body of the message
Enable the option of Filter messages with blank senders
Make use of any of the three Email authentication systems( Sender policy framework or
SenderID or Domain Keys Identified Mails)
There are no foolproof ways to prevent your computer system from these spoofing methods. All
you need to do is to exercise some caution in the usage.
Phishing the practice of attempting to obtain users credit card or online banking
information, often incorporates e-mail spoofing. For example, a phisher may send e-mail that
looks as if it comes from the banks or credit cards administrative department, asking the user to
log onto a Web page (which purports to be the banks or credit card companys site but really is
set up by the phisher) and enter passwords, account numbers, and other personal information.
Whatever the motivation, the objective of spoofed mail is to hide the real identity of the sender.
This can be done because the Simple Mail Transfer Protocol (SMTP) does not require
authentication (unlike some other, more secure protocols). A sender can use a fictitious return
address or a valid address that belongs to someone else.
Receiving mail from spoofed addresses ranges from annoying to dangerous (if youre taken in by
a phisher). Having your own address spoofed can be even worse. If a spammer uses your
address as the return address, you may suddenly find yourself inundated with angry complaints
from recipients or even have your address added to spammer lists that results in your mail
being banned from many servers.
What FBI Says:
he FBI, in conjunction with national Internet service provider Earthlink, the Federal Trade
Commission, and the National Consumer's League, began an initiative today to raise awareness
about the growing problem of web spoofing scams and to give consumers and businesses
important tips on how to protect themselves from these scams.
According to Jana Monroe, assistant director of the FBI's Cyber Division, "Bogus e-mails that
try to trick customers into giving out personal information are the hottest, and most troubling,
new scam on the Internet."
The FBI's Internet Fraud Complaint Center (IFCC) has seen a steady increase in complaints that
involve some form of unsolicited e-mail directing consumers to a phony "Customer Service"
type of website. Assistant Director Monroe said that the scam is contributing to a rise in identity
theft, credit card fraud, and other Internet frauds.
"Spoofing" or "phishing" frauds attempt to make Internet users believe that they are receiving email from a specific, trusted source, or that they are securely connected to a trusted website,
when that is not the case. Spoofing is generally used as a means to convince individuals to
provide personal or financial information that enables the perpetrators to commit credit
card/bank fraud or other forms of identity theft. Spoofing also often involves trademark and
other intellectual property violations.
In "e-mail spoofing" the header of an e-mail appears to have originated from someone or
somewhere other than the actual source. Spam distributors and criminals often use spoofing in an
attempt to get recipients to open and possibly even respond to their solicitations.
"IP spoofing" is a technique used to gain unauthorized access to computers, whereby the intruder
sends a message to a computer with an IP address indicating that the message is coming from a
trusted port.
"Link alteration" involves altering the return address in a web page sent to a consumer to make it
go to the hacker's site rather than the legitimate site. This is accomplished by adding the hacker's
address before the actual address in any e-mail, or page that has a request going back to the
original site. If an individual unsuspectingly receives a spoofed e-mail requesting him/her to
"click here to update" their account information, and then are redirected to a site that looks
exactly like their Internet Service Provider, or a commercial site like EBay or PayPal, there is an
increasing chance that the individual will follow through in submitting their personal and/or
credit information.
According to Assistant Director Monroe, the FBI's specialized Cyber Squads and Cyber Crime
Task Forces across the country are zeroing in on the spoofing problem. The FBI's legal attach
offices overseas are helping to coordinate investigations that cross international borders. The
IFCC has received complaints that trace back to perpetrators in England, Romania, and Russia.
The FBI is also working actively with key Internet e-commerce stake-holders such as
EBay/PayPal, Escrow.com, and a variety of Internet merchants via the Merchants Risk Council
to identify common traits of such scams, as well as proactive measures to rapidly respond.
The FBI offers the following tips for Internet users:
If you encounter an unsolicited e-mail that asks you, either directly, or through a website,
for personal financial or identity information, such as Social Security number, passwords,
or other identifiers, exercise extreme caution.
If you need to update your information online, use the normal process you've used before,
or open a new browser window and type in the website address of the legitimate
company's account maintenance page.
If a website address is unfamiliar, it's probably not real. Only use the address that you
have used before, or start at your normal homepage.
Always report fraudulent or suspicious e-mail to your ISP. Reporting instances of spoof
websites will help get these bogus websites shut down before they can do any more harm.
Most companies require you to log in to a secure site. Look for the lock at the bottom of
your browser and "https" in front of the website address.
Take note of the header address on the website. Most legitimate sites will have a
relatively short Internet address that usually depicts the business name followed by
".com," or possibly ".org." Spoof sites are more likely to have an excessively long string
of characters in the header, with the legitimate business name somewhere in the string, or
possibly not at all.
If you have any doubts about an e-mail or website, contact the legitimate company
directly. Make a copy of the questionable web site's URL address, send it to the
legitimate business and ask if the request is legitimate.
If you've been victimized by a spoofed e-mail or website, you should contact your local
police or sheriff's department, and file a complaint with the FBI's Internet Fraud
Complaint Center at www.ifccfbi.gov.