t****n 发帖数: 2601 | 1 【 以下文字转载自 ChinaNews 讨论区 】
发信人: tgbyhn (CNN), 信区: ChinaNews
标 题: 明年诺贝尔和平奖得主病毒
发信站: BBS 未名空间站 (Sat Oct 30 11:47:24 2010, 美东)
刘晓波是个病毒
企图瓦解中共宿主
诺贝尔和平奖委员会高度赞赏病毒对抗宿主强权
并在网站上大量免费发放病毒
广大痛恨IE,使用FF的liberals纷纷中毒
计算机被人侵入,底裤被人掀开
关键词:病毒,诺贝尔和平奖,台湾
Oslo, Norway – Oct. 26, 2010 - Norman ASA, a leading security company
offering products protecting government and enterprise networks and
consumer desktops, today announced that its researchers have identified new
Trojan malware that infected the Nobel Peace Prize site early Tuesday. The
new Trojan was transmitted through a vulnerability in Firefox version 3.5
and 3.6.
The Norman Malware Detection Team in Oslo found that the attack was enabled
by a zero-day vulnerability in the popular Firefox web browser and recommend
all Internet users be cautious when surfing the net. If a user visited the
Nobel Prize site while the attack was active early Tuesday using Firefox 3.
5 or 3.6, the malware might be installed on the user’s computer without
warning.
The malware would then attempt to connect to two Internet addresses, both
which point to a server in Taiwan. If the connection was successful, the
attacker would have access to the infected computer. This Trojan could be
active on other websites.
All Norman antimalware solutions for consumers, the enterprise and
government users have detection for this Trojan and any attempt at infection
will be blocked.
More information about this exploit is available at: http://www.norman.com/security_center/virus_description_archive/129146/
A Trojan is malicious software (malware) that does unwanted actions - for
example, it allows unauthorized access to a user’s computer, most often to
steal secrets such as passwords and financial information. Mozilla Firefox
is an open source web browser and is believed to be the second most widely
used browser in the world. A zero-day attack is a threat that tries to
exploit Internet or computer software vulnerabilities while no patch or
remedy is available.
It should be noted that the vulnerability and malware was originally
discovered by the crew at Telenor SOC, who also generously provided samples. |
|