Worms/Trojans: The Latest Virus Threat
Posted on 01.04.2003
The last months have seen a notable increase in the number of worm/Trojan viruses infecting users' computers. As the name suggests, this kind of virus has characteristics of both worms and Trojans, making it a particularly dangerous breed of malicious code. On the one hand, like a worm, these viruses can spread rapidly via the Internet or through e-mails, searching for vulnerable computers. On the other hand, and what makes them even more dangerous, they can carry out Trojan-type actions, such as controlling communication ports to allow access to hackers.

This they can do either directly, with a single virus carrying out both types of action or, more commonly, indirectly using more than one virus. The Opaserv worm is an example of the former, while Lovgate, which installs itself on the victim's computer before downloading other files (Trojans) from the Internet, is a typical example of the latter.

One of the pioneers of this type of attack is Bugbear, which reached epidemic proportions at the end of last year. This worm spreads across the Internet via e-mail, and when it infects a computer, it drops a Trojan which makes external connections through a communication port. More recently, cases such as Randon or Deloder, which spreads via IRC and can carry out numerous malicious actions, further highlight the need to take effective preventive action.

Detecting this kind of virus after it has infected is simply not enough. Effective protection involves blocking these worm/Trojans at the communication port level, which can be done simply by using a personal firewall. These devices can detect and block any kind of unusual activity that tries to enter the computer.

With this in mind, some antivirus developers have included this kind of protection in their solutions, as is the case with Panda Antivirus Platinum 7.0, which includes a latest generation personal firewall combined with innovative antivirus technology to help turn PCs into a fortress against all types of viruses including worm/Trojans.

According to Luis Corrons, head of Panda Software's Virus Laboratory, "All indications are that in the near future worm/Trojans will be responsible for a large number of attacks, as the creators of these viruses have now seen how effective they can be. The only way of avoiding them is to be fully aware of the threat that they represent, and ensuring that all systems are adequately protected."





Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //