Showing posts with label trojan. Show all posts
Showing posts with label trojan. Show all posts
Monday, September 18, 2017
Trojan Milicenso Printer Bomb
Trojan Milicenso Printer Bomb

Sebuah Trojan, akhir-akhir ini menimbulkan di antara pengguna printer. Karena Trojan yang satu ini membuat printer untuk menge-print secara besar-besaran tanpa berhenti, sehingga printer pun bisa terbakar/meledak. Trojan ini bernama Trojan Milicenso.
Trojan Milicenso pertama kali ditemukan pada tahun 2010. Akan tetapi, Trojan ini sedang booming di tahun 2012 ini dikarenakan akibatnya pada printer.
Untuk mencapai sebuah komputer, Trojan ini dapat masuk melalui e-mail, attachments dan script hosting situs, bahkan bisa masuk melalui video codec palsu. Setelah Trojan masuk ke dalam komputer, Trojan langsung memicu komputer untuk men-download beberapa file berbahaya. Selain itu, saat Trojan ini sudah dieksekusi (dijalankan), Trojan Milicenso ini akan membuat berbagai macam file di direktori sistem dan meng-edit Windows registry. Peng-editan mungkin akan menyebabkan lalulintas melalui firewall komputer. Trojan ini pun dapat mendownload updatenya yang memungkinkan adanya tambahan aksi yang dapat merusak kompter dan sekitarnya. Inilah cara kerja Trojan Milicenso.

Selain aksi di atas, trojan ini juga melakukan aksi yang terlihat oleh pengguna komputer, secara aksi yang telah disebutkan di atas merupakan aksi yang tersembunyi dari pengguna, sehingga pengguna tidak mengetahui apakah komputernya terinfeksi atau tidak. Trojan Milicenso akan menampilkan iklan-iklan dan re-direction dari browser, yang mengarahkan link pada browser ke arah link-link iklan. Selain itu, yang paling menarik perhatian adalah Trojan ini mengirimkan perintah tugas yang sangat banyak kepada printer yang terhubung dengan komputer yang terinfeksi ini. Sehingga printer akan meng-print secara random, file-file yang ada di komputer.
Namun, sekarang, antivirus yang mendunia seperti Symantec sudah dapat membasmi Trojan ini. Kalau pakai antivirus masih belum bisa, kita bisa menghapusnya secara manual. Dengan cara sebagai berikut :
1. men-disable System Restore sementara
2. Update antivirus yang dimiliki
3. Restart komputer dalam Safe Mode
4. Setelah masuk ke dalam Safe Mode, jalankan full system scan dan clean infected files. Jika tidak bisa di bersihkan, letakkan file terinfeksi dalam karantina antivirus.
5. Lalu, restart lagi komputer dan pastikan Trojan Milicenso sudah hilang dari komputer anda
Selain cara di atas, anda juga bisa melakukan scanning komputer dengan antivirus online.
Sekian saja posting saya kali ini, semoga bermanfaat.
Sumber :
thehackernews.com
symantec.com
precisesecurity.com
egotastic.com
go.bloomberg.com
download file now
Saturday, September 9, 2017
Trojan Horse
Trojan Horse

Sejarah pemakaian nama Trojan ini adalah berasal dari Eropa. Pada suatu hari terjadi perang antara kaum Troya dengan kaum Sparta. Perang ini berlangsung sangat amat lama sekali. Akhirnya Sparta pindah pangkalan perang. Kaum Troya mengira bahwa Sparta melarikan diri. Jadi kaum Troya mengambil semua barang milik Sparta yang ditinggalkan. Salah satunya adalah patung kuda raksasa. Pada malamnya mereka semua berpesta atas kemenangannya. Tiba-tiba,
dari dalam patung kuda itu muncul banyak sekali prajurit Sparta. Dengan kejapan mata kaum Troya dapat dikalahkan. Nah, dari sini lah nama itu diambil karena memiliki fungsi yang sama.

Saat ini telah banyak orang yang mencoba membuat Trojan virus, karena dengan adanya Trojan virus, pencipta virus akan mendapatkan apa yang ia inginkan. Seperti nomor rekening + password, account ym, fb, tweeter milik korban akan menjadi milik si pencipta Trojan virus. Jadi, virus yang satu ini perlu diwaspadai juga, karena meski tidak menggangu kenyamanan anda dalam berkomputeria, tapi bisa memiliki apa yang anda miliki di komputer anda.
Pada tahun 2010 ini, ada sebuah Trojan yang terkenal. Trojan ini akan anda temukan di warnet-warnet yang tidak mempedulikan keamanan komputer. Ciri-ciri dari virus ini adalah ada �autorun.inf� dan folder �RECYCLER� yang beratribut hidden system. Jadi hati-hati kalau flashdisk anda terdapat file-file tersebut. Sebaiknya anda tetap memperhatikan file-file aneh yang tidak anda ketahui sebelumnya.
Beware�..
download file now
Friday, September 8, 2017
Trojan Killer 2 1 5 8
Trojan Killer 2 1 5 8
Download Trojan Killer 2.1.5.8
Trojan Killer 2.1.5.8 most important software tools is used to remove spyware, Trojans and other malicious software works on the examination of all the files and malware detection and removal and cleaning infected files and restore optimal performance of your computer clean of the browser also rootkits or worms or adware freeze remove and restore performance naturaland enjoy clean your computer from viruses and other malicious software. Trojan Killer is to protect your system from adware, rootkits and other malicious files is the maker of the virus database
update the software every hour to keep your computer and all the image files, music and video games, folders and all your data.Trojan Killer is the removal of malicious and suspicious files without the user having to manually edit system files, Trojan killer also removes the additional system modifications some Malware carries out which are ignored by some antivirus

Version:
2.1.5.8
Size:
25.37 MB
Operating system:
Windows XP, Vista,
Windows 7, Windows 8 (32-bit & 64-bit)

Download Trojan Killer 2.1.5.8
download file now
Sunday, August 27, 2017
Trojan bad Beware !!
Trojan bad Beware !!

Its All Explained Here
for more info Click Here
Trojan horse well this term has many meanings .
In the context of computer software, a Trojan horse is a malicious program that is disguised as or embedded within legitimate software. The term is derived from the classical myth of the Trojan Horse. They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.
Often the term is shortened to simply Trojan, even though this turns the adjective into a noun, reversing the myth (Greeks were gaining malicious access, not Trojans).
There are two common types of Trojan horses.
One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities.
The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the programs objectives.
for more info Click Here
Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer systems security design or configuration.
Definition
A Trojan horse program has a useful and desired function, or at least it has the appearance of having such. Trojans use false and fake names to trick users into dismissing the processes. These strategies are often collectively termed social engineering. In most cases the program performs other, undesired functions, but not always. The useful, or seemingly useful, functions serve as camouflage for these undesired functions. A trojan is designed to operate with functions unknown to the victim. The kind of undesired functions are not part of the definition of a Trojan Horse; they can be of any kind, but typically they have malicious intent.
In practice, Trojan Horses in the wild often contain spying functions (such as a packet sniffer) or backdoor functions that allow a computer, unknown to the owner, to be remotely controlled from the network, creating a "zombie computer". The Sony/BMG rootkit Trojan, distributed on millions of music CDs through 2005, did both of these things. Because Trojan horses often have these harmful behaviors, there often arises the misunderstanding that such functions define a Trojan Horse.
In the context of Computer Security, the term Trojan horse was first used in a seminal report edited/written by JP Anderson (aka The Anderson Report (Computer Security Technology Planning, Technical Report ESD-TR-73-51, USAF Electronic Sysstem Division, Hanscom AFB, Oct, 1972), which credits Daniel J Edwards then of NSA for both the coinage and the concept. One of the earliest known Trojans was a binary Trojan distributed in the binary Multics distribution; it was described by PA Karger and RR Schell in 1974 (Multics Security Evaluation, Technical Report ESD-TR-74-193 vol II, HQ Electronic Systems Division, Hanscom AFB, June 1974).
The basic difference from computer viruses is that a Trojan horse is technically a normal computer program and does not possess the means to spread itself. The earliest known Trojan horses were not designed to spread themselves. They relied on fooling people to allow the program to perform actions that they would otherwise not have voluntarily performed.
Trojans implementing backdoors typically setup a hidden server, from which a hacker with a client can then log on to. They have become polymorphic, process injecting, prevention disabling, easy to use without authorization, and therefore are abusive.
Trojans of recent times also come as computer worm payloads. It is important to note that the defining characteristics of Trojans are that they require some user interaction, and cannot function entirely on their own nor do they self-propagate/replicate.
Examples
Example of a simple Trojan horse
A simple example of a trojan horse would be a program named "waterfalls.scr.exe" claiming to be a free waterfall screensaver which, when run, instead begins erasing all the files on the computer.
Example of a somewhat advanced Trojan horse
On the Microsoft Windows platform, an attacker might attach a Trojan horse with an innocent-looking filename to an email message which entices the recipient into opening the file. The Trojan horse itself would typically be a Windows executable program file, and thus must have an executable filename extension such as .exe, .com, .scr, .bat, or .pif. Since Windows is sometimes configured by default to hide filename extensions from a user, the Trojan horse is an extension that might be "masked" by giving it a name such as Readme.txt.exe. With file extensions hidden, the user would only see Readme.txt and could mistake it for a harmless text file. Icons can also be chosen to imitate the icon associated with a different and benign program, or file type.
When the recipient double-clicks on the attachment, the Trojan horse might superficially do what the user expects it to do (open a text file, for example), so as to keep the victim unaware of its real, concealed, objectives. Meanwhile, it might discreetly modify or delete files, change the configuration of the computer, or even use the computer as a base from which to attack local or other networks - possibly joining many other similarly infected computers as part of a distributed denial-of-service attack. The Sony/BMG rootkit mentioned above both installed a vulnerability on victim computers, but also acted as spyware, reporting back to a central server from time to time, when any of the music CDs carrying it were played on a Windows computer system.
Types of Trojan horses
Trojan horses are almost always designed to do various harmful things, but could be harmless. Examples are
erasing or overwriting data on a computer.
encrypting files in a cryptoviral extortion attack.
corrupting files in a subtle way.
upload and download files.
allowing remote access to the victims computer. This is called a RAT. (remote administration tool)
spreading other malware, such as viruses. In this case the Trojan horse is called a dropper or vector.
setting up networks of zombie computers in order to launch DDoS attacks or send spam.
spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware).
make screenshots.
logging keystrokes to steal information such as passwords and credit card numbers (also known as a keylogger).
phish for bank or other account details, which can be used for criminal activities.
installing a backdoor on a computer system.
opening and closing CD-ROM tray
Time bombs and logic bombs
"Time bombs" and "logic bombs" are types of trojan horses.
"Time bombs" activate on particular dates and/or times. "Logic bombs" activate on certain conditions met by the computer.
Precautions against Trojan horses
Trojan horses can be protected against through end user awareness. Trojan Horse viruses can cause a great deal of damage to a personal computer but even more damaging is what they can do to a business, particularly a small business that usually does not have the same virus protection capabilities as a large business. Since a Trojan Horse virus is hidden it is harder to protect yourself or your company from them but there are things that you can do.
Trojan Horses are most commonly spread through an e-mail, much like other types of common viruses. The only difference being of course is that a Trojan Horse is hidden. The best ways to protect yourself and your company from Trojan Horses are as follows:
1. If you receive e-mail from someone that you do not know or you receive an unknown attachment never open it right away. As an e-mail use you should confirm the source. Some hackers have the ability to steal an address books so if you see e-mail from someone you know that does not necessarily make it safe.
2. When setting up your e-mail client make sure that you have the settings so that attachments do not open automatically. Some e-mail clients come ready with an anti-virus program that scans any attachments before they are opened. If your client does not come with this it would be best to purchase on or download one for free.
3. Make sure your computer has an anti-virus program on it and make sure you update it regularly. If you have an auto-update option included in your anti-virus program you should turn it on, that way if you forget to update your software you can still be protected from threats
4. Operating systems offer patches to protect their users from certain threats and viruses, including Trojan Horses. Software developers like Microsoft offer patches that in a sense �close the hole� that the Trojan horse or other virus would use to get through to your system. If you keep your system updated with these patches your computer is kept much safer.
5. Avoid using peer-2-peer or P2P sharing networks like Kazaa , Limewire, Ares, or Gnutella because those programs are generally unprotected from viruses and Trojan Horse viruses are especially easy to spread through these programs. Some of these programs do offer some virus protection but often they are not strong enough.
Besides these sensible precautions, one can also install anti-trojan software, some of which are offered free.
Methods of Infection
The majority of trojan horse infections occur because the user was tricked into running an infected program. This is why youre not supposed to open unexpected attachments on emails -- the program is often a cute animation or a sexy picture, but behind the scenes it infects the computer with a trojan or worm. The infected program doesnt have to arrive via email, though; it can be sent to you in an Instant Message, downloaded from a Web site or by FTP, or even delivered on a CD or floppy disk. (Physical delivery is uncommon, but if you were the specific target of an attack, it would be a fairly reliable way to infect your computer.) Furthermore, an infected program could come from someone who sits down at your computer and loads it manually.
Websites: You can be infected by visiting a rogue website. Internet Explorer is most often targeted by makers of trojans and other pests, because it contains numerous bugs, some of which improperly handle data (such as HTML or images) by executing it as a legitimate program. (Attackers who find such vulnerabilities can then specially craft a bit of malformed data so that it contains a valid program to do their bidding.) The more "features" a web browser has (for example ActiveX objects, and some older versions of Flash or Java), the higher your risk of having security holes that can be exploited by a trojan horse.
Email: If you use Microsoft Outlook, youre vulnerable to many of the same problems that Internet Explorer has, even if you dont use IE directly. The same vulnerabilities exist since Outlook allows email to contain HTML and images (and actually uses much of the same code to process these as Internet Explorer). Furthermore, an infected file can be included as an attachment. In some cases, an infected email will infect your system the moment it is opened in Outlook -- you dont even have to run the infected attachment.
For this reason, using Outlook lowers your security substantially.
Open ports: Computers running their own servers (HTTP, FTP, or SMTP, for example), allowing Windows file sharing, or running programs that provide filesharing capabilities such as Instant Messengers (AOLs AIM, MSN Messenger, etc.) may have vulnerabilities similar to those described above. These programs and services may open a network port giving attackers a means for interacting with these programs from anywhere on the Internet. Vulnerabilities allowing unauthorized remote entry are regularly found in such programs, so they should be avoided or properly secured.
A firewall may be used to limit access to open ports. Firewalls are widely used in practice, and they help to mitigate the problem of remote trojan insertion via open ports, but they are not a totally impenetrable solution, either.
for more info Click Here
download file now
Friday, August 18, 2017
Trojan ADH dan Cara Membersihkannya
Trojan ADH dan Cara Membersihkannya

Hello guys, kali ini saya akan membahas tentang salah satu malware yang cukup berbahaya dan sangat merugikan. Yaitu Trojan varian ADH. Dan yang paling penting, saya akan membahas juga cara untuk membersihkan trojan ini dari komputer.
Akhir-akhir ini, trojan yang satu ini banyak menginfeksi komputer-komputer di seluruh dunia terutama komputer yang sering online (conect internet). Nah, biasanya pemakai komputer yang masih
memakai antivirus dengan database lama, trojan ini akan terdeteksi sebagai malware tipe baru. Tapi, jika sudah pakai antivirus yang selalu di-update, akan terdeteksi sebagai Trojan.ADH.
Trojan ini menyerang OS Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003, Windows 2000 dan Windows 7.
Trojan ini telah dimodifikasi oleh pembuatnya, agar terhindar dari patroli antivirus. Jadi, terkadang antivirus kita sudah berhasil mendeteksi keberadaan trojan ini lalu kita menghapusnya, tapi beberapa saat kemudian akan muncul peringatan lagi bahwa ada Trojan.ADH di komputer kita. Padahal kita sudah menghapusnya. Tetapi, masih ada saja peringatan bahaya Trojan.ADH dan juga peringatan ini sering muncul bahkan bisa sampai 4 peringatan/menit.
Nah, untuk itulah kita harus me-remove-nya dari komputer kita. Nanti akan saya jelaskan caranya. Oh ya, yang saya ceritain tadi, itu adalah pengalaman saya. Kompie saya pernah ke-infect sama ni trojan. Tapi, alhamdulillah sekarang kompienya udah sehat lagi.
Apa aja sih yang dilakukan trojan ini terhadap komputer kita ?
1. Trojan ini bisa membuat komputer kita berjalan lambat. Jadi, kalau komputer anda berjalan lambat, hati-hati mungkin saja itu akibat trojan ADH.
2. Trojan ini akan mem-block kita agar kita tidak bisa mengakses security web sites (situs keamanan).
3. Trojan ini akan berjalan otomatis (tanpa pemberitahuan terlebih dulu).
Dengan adanya hal-hal di atas, terutama yang nomor 2, kita harus sesegera mungkin untuk me-remove trojan ini. Karena dengan adanya trojan ini, keamanan komputer kita saat kita sedang surfing di internet melemah sehingga malware-malware yang lain dapat masuk ke komputer kita
Cukup dulu infonya tentang trojan ADH ini, sekarang kita akan membahas cara untuk remove Trojan.ADH. Untuk mengatasi Trojan ini ada 2 cara yang bisa anda lakukan. Yaitu :
A. Cara Online
Anda bisa menggunakan online scanner disediakan situs-situs antivirus. Dengan menggunakan online scanner ini, kita tak perlu repot-repot untuk meng-install antivirus. Mudahkan tinggal di scan secara online.
B. Cara Offline
1. Pertama, matikan System Restore pada komputer anda. Caranya : masuk ke control panel dan cari system restore, lalu di-disable.
2. Setelah itu, Reboot (Restart) komputer anda. Tekan "F8" pada saat awal restart untuk masuk ke "Safe Mode".
3. Pilih "Safe mode with Networking" pada pilihan, setelah kita menekan F8.
4. Setelah itu, scan komputer anda dengan antivirus yang anda miliki. tapi kalau bisa sudah di-update.
5. Abis itu, reboot lagi secara normal (bukan safe mode).
6. Selesai
Nah, jika udah melakukan step di atas, insya Allah trojan ADH berhasil di-remove.
Sekian info dari saya. Semoga bermanfaat..
Sumber : precisesecurity.com, blog.teesupport.com, symantec.com
download file now
Labels:
adh,
cara,
dan,
membersihkannya,
trojan
Subscribe to:
Posts (Atom)