![]() When Phatbot infects a system, it searches for passwords that are stored on hard drives and those that are traveling on local area networks. ![]() Phatbot allows the attacker to gain control over infected computers and link them into P2P networks that can then be used to send large amounts of spam e-mail messages, flood web sites with data in an attempt to create a denial of service (DoS) condition, or to perform other unauthorized activities. (Phatbot does not appear to use e-mail for propagation.) government, are monitoring the emergence of PhatBot, a new, sophisticated hacker program that is capable of infecting systems by a variety of methods, such as through network security flaws in Microsoft's Windows operating system, peer-to-peer networks, and backdoors installed by the recent "Mydoom" and "Bagle" Internet worms. Computer security experts, in both the private sector and U.S. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |