Audio By Carbonatix
Security experts are warning about a stealthy Windows virus that steals login details for online bank accounts.
In the last month, the malicious program has racked up about 5,000 victims - most of whom are in Europe.
The creators of the virus are after bank logins and personal data and are falling victim via booby-trapped websites that use vulnerabilities in Microsoft's browser to install the attack code.
Experts say the virus is dangerous because it buries itself deep inside Windows to avoid detection.
Old tricks
The malicious program is a type of virus known as a rootkit and it tries to overwrite part of a computer's hard drive called the Master Boot Record (MBR): where a computer looks when it is switched on for information about the operating system it will be running.
"If you can control the MBR, you can control the operating system and therefore the computer it resides on," wrote Elia Florio on security company Symantec's blog.
Mr Florio pointed out that many viruses dating from the days before Windows used the Master Boot Record to get a grip on a computer.
Once installed, the virus, dubbed Mebroot by Symantec, usually downloads other malicious programs, such as keyloggers, to do the work of stealing confidential information.
Most of these associated programs lie in wait on a machine until its owner logs in to the online banking systems of one of more than 900 financial institutions.
The Russian virus-writing group behind Mebroot is thought to have created the torpig family of viruses that are known to have been installed on more than 200,000 systems. This group specialises in stealing bank login information.
Security firm iDefense said Mebroot was discovered in October but started to be used in a series of attacks in early December.
Between 12th December and 7th January, iDefense detected more than 5,000 machines that had been infected with the program. Analysis of Mebroot has shown that it uses its hidden position on the MBR as a beachhead so it can re-install these associated programs if they are deleted by anti-virus software.
Although the password-stealing programs that Mebroot installs can be found by security software, few commercial anti-virus packages currently detect its presence. Mebroot cannot be removed while a computer is running.
Independent security firm GMER has produced a utility that will scan and remove the stealthy program.
Computers running Windows XP, Windows Vista, Windows Server 2003 and Windows 2000 that are not fully patched are all vulnerable to the virus.
SOURCE: BBC
DISCLAIMER: The Views, Comments, Opinions, Contributions and Statements made by Readers and Contributors on this platform do not necessarily represent the views or policy of Multimedia Group Limited.
Tags:
DISCLAIMER: The Views, Comments, Opinions, Contributions and Statements made by Readers and Contributors on this platform do not necessarily represent the views or policy of Multimedia Group Limited.
Latest Stories
-
UK and South Korea strike trade deal
22 minutes -
Trump urges Xi to free Hong Kong’s Jimmy Lai
33 minutes -
Trump sues BBC for defamation over Panorama speech edit
44 minutes -
Ford to scale back electric vehicle plans, taking $19.5bn hit
55 minutes -
What’s next for TikTok in the US as deal prospects remain uncertain?
1 hour -
19 suspects arrested in joint operation at AkatsiÂ
5 hours -
Unemployed gets 48 months in prison over stealingÂ
5 hours -
Mariah Carey to sing at Winter Olympics opening ceremony
5 hours -
Man United and Bournemouth draw 4-4 in extra ordinary thriller
5 hours -
Canada’s Carney called out for ‘utilizing’ British spelling
5 hours -
Smooth end to Messi India tour after Kolkata chaos
5 hours -
Epstein’s UK flights had alleged British abuse victims on board, BBC finds
6 hours -
Rob Reiner’s son Nick arrested for murder after director and wife found dead
6 hours -
What to delete from your emails to be taken more seriously at work
6 hours -
Airbnb fined £56m by Spain for advertising unlicensed properties
6 hours
