Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers and open them for use in further attacks.
"Combating computer viruses is essentially a game of hide and seek," says Govind Rammurthy, CEO, MicroWorld Technologies, among the leading Security Solutions providers. "Hackers riding piggyback on viruses have only a short window of opportunity to maximize their gain before the viruses are detected, neutralized and logged into Virus Definition databases, 'vaccinating' the system against those strains.
Without continuing system vulnerability caused by virus infection there is little they can do to further their malicious ends like stealing personal information, credit card details and other sensitive and vital data. To achieve their ends they need to keep the system vulnerability going for more time. This co-ordinated Trojan threat is an attempt to the keep that 'backdoor' open, essentially buying time," he concludes.
Of the three, Glieder leads the initial charge. It sneaks past anti-virus protection to download and execute files from a long, hard-coded list of URLs and "plant" the infected machine with "hooks" for future use. On Windows 2000 and Windows XP machines, it attempts to stop and disable the Internet Connection Firewall and the Security Center service (introduced with Windows XP Service Pack 2). Then the Trojan accesses the URL list to download Fantibag. The way is now paved to launch the second stage of attack.
Sulabh, a tester with MicroWorld Technologies says of Fantibag, "Now Fantibag goes about attacking the networking feature of the infected system to prevent it from communicating with anti-virus firms and denying access to the Microsoft Windows Update site. It closes your escape route by making it impossible to download an anti-virus solution and any subsequent Windows security patch to your system. Effectively it helps Mitglieder (the third stage Trojan) open the 'backdoor' by shutting the other doors on you."
Mitglieder puts the system under complete control of the attacker by opening the 'backdoor' on a port using which the attacker can update the Trojan, to stay a step ahead of attempts to remove it, download and execute files, initiate an SMTP server to relay spam, execute files on the infected computer and download and execute files via an URL. "This is what makes it scary," say Aarti, Assistant Manager, QA, MicroWorld Technologies. "The fact that the system can now be used as a remote controlled 'soldier' (bot) in an army (botnet) of similarly compromised machines to launch criminally motivated attacks, causing harm to Internet users."
Botnets thus formed can among other things, use your machine to launch Distributed Denial of service attacks which overload servers, making them crash, to send out spam, spread new Malware, plant Keylogger to retrieve your personal information like identity, passwords, account numbers etc., install Spyware, manipulate online polls/games, abuse programs like Google AdSense to cheat advertisers of revenue, and install Advertisement Addons for financial gain as in fake websites advertising services that don't exist.
"Botnets can even encompass over 50,000 host machines. The potential for mischief is huge," reflects Govind Rammurthy. "Such a three-pronged Trojan attack where attackers change their virus code and release viruses quickly to bypass virus signature scanners, then disable network access to deny the user link-ups to anti-virus and Microsoft Windows Update site for protection has huge significance for virus-signature based protection. It is a sign of things to come," he says, remembering the scramble at MicroWorld labs to update their products to detect and remove the three Trojans.
Anti-virus updates for the three-pronged Trojan threat are available at MicroWorld Technologies site. Maybe the time for worrying about some pimply teenager turning out malicious code because they have nothing better to do on a nice sunny morning, is over. The world could be facing a determined organized crime syndicate who'll stop at nothing to get what they want - information precious to you.
MicroWorld Technologies is one of the leading solution providers for Information Technology, Content Security and Communications Software. MicroWorld has established itself as a leader in providing content security, anti-virus and corporate communications software solutions.
![]() |
|
![]() |
|
![]() |
|
![]() |
At this point, if you've got the whole "turning the... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Pharming is one of the latest online scams and rapidly... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Sooner or later everyone with an email account will receive... Read More
Ok, you've got a computer, and you get online. You... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Before you enter your name, address or any other data... Read More
There are several basic concepts to keep in mind when... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Afraid that someone is monitoring your PC or installed a... Read More
History and BackgroundThe virus was one of the first ever... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
I got a virus the other day, Thursday I believe... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
During the release of a new software product specialized to... Read More
Well, this is an article I never thought I would... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
First I would like to stress I am condoning the... Read More
If you are a parent, you have probably wondered at... Read More
By browsing a web page, you could infect your computer... Read More
Every now and then you can read about a new... Read More
Imagine this ? you open up your email box and... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
First the basic definition of Spyware: It is a type... Read More
There is nothing more important that password security in world... Read More
First of all we need to get some terms stated.... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
There you are busily typing away on your PC or... Read More
You'd better learn news from media, not from emails, security... Read More
Many of us have run into an annoying and time-consuming... Read More
When it comes to reporting Internet scams most of us... Read More
The Message Must Get Through The year is 300A.D.,... Read More
In a word, no - an email message has always... Read More
File sharing on p2p is soaring despite the music and... Read More
Fishing on the Internet has come a long way. However,... Read More
As you know, this time the virus under the name... Read More
Internet scams and frauds are on the rise! The quantity... Read More
If you are a parent, you have probably wondered at... Read More
If you know what is the 'Fishing' then it's very... Read More
During the release of a new software product specialized to... Read More
To blog or not to blog? Well, why not? Lots... Read More
There is nothing more important that password security in world... Read More
By browsing a web page, you could infect your computer... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Ok, ok, I know you've seen them. All those pop... Read More
The money being spent online is steadily growing. With billions... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
You can detect spyware online using free spyware cleaners and... Read More
The first thing people think about when defending their computers... Read More
There is no doubt that "how-to articles" have become a... Read More
The Threat10 years ago you could probably have run no... Read More
A little bit of time invested into learning about internet... Read More
With the advent of the World Wide Web, a whole... Read More
These six ways to prevent identity theft offer you valuable... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Threats we ordinary Web users face online leave us no... Read More
Identity Theft is one of the most serious problems facing... Read More
Internet Security |