One of Pinch’s main features is that it allows attackers to specify the data that Trojans steal. One of the interface tabs, PWD, allows malicious users to select the type of password to be stolen by the Trojan: from email passwords to passwords kept by the system tools. Also, it is possible to order the Trojan to encrypt this data when sending it, so that nobody else can read it.
The SPY tab lets criminals turn Trojans into keyloggers that capture all key strokes. Trojans can also be designed to take screenshots on the infected computer, steal browser data or look for certain files on the target system.
A feature called NET allows attackers to use Pinch to turn the infected computer into a proxy, so that it can be used to perform malicious or criminal activities on the Internet without leaving any trace. Trojans can also be turned into downloaders that download other executable files onto the compromised computer.
The BD tab allows crooks to specify the ports that the Trojan will open on the infected computer, thus giving backdoor features to Trojans. The ETC tab allows the Trojans to be hidden through techniques including rootkits.
One of the most dangerous features of Pinch can be exploited through the WORM tab, which allows criminals to add worm features to their creations, so that they can spread by their own means, infecting other files or sending themselves out by email.
Pinch also lets users carry out other actions: turn infected computers into zombie computers, pack Trojans to make detection more difficult, and kill certain system processes, particularly those of security solutions.
Finally, Pinch lets users define the way in which stolen data must be sent to its creator. Cyber-crooks can receive data via SMTP, HTTP or, simply order the Trojan to leave stolen data in a file on the infected computer to retrieve it later on through a port opened by the Trojan itself.
Pinch is accompanied by a parser program that allows users to decrypt the reports created by the Trojan with the stolen data and perform searches in them, so that cyber-crooks can easily identify the most profitable data.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.