Skip to main content

Next Prev Editor's Pick News Article 5 facts about new virus hacking bank accounts


A new computer virus, dubbed Gauss, has been discovered in the Middle East. Researchers say can it steal banking credentials and hijack login information for social networking sites, email and instant messaging accounts.

Cyber security firm Kaspersky Lab said Gauss is the work of the same "factory" or "factories" that built the Stuxnet worm, which attacked Iran's nuclear program. Here are some key facts about Gauss, according to Kaspersky Lab.

What is its purpose? Gauss is a surveillance tool. It steals credentials for hacking online banking systems, social networking sites and email accounts; it also gathers information about infected PCs, including web browsing history, system passwords and the contents of disk drives.

Can it do anything else? There is a mysterious module, known as Godel, that copies malicious code onto USB drives when they are plugged into infected PCs. Godel's purpose is unknown because some of its code is compressed and scrambled using a sophisticated encryption method. It only activates when it infects a predetermined target. Researchers have not identified the target or figured out its mission. Kaspersky Lab senior researcher Roel Schouwenberg said he believes it may be a "warhead" designed to damage industrial control systems.

How many victims are there? Kaspersky Lab has uncovered more than 2,500 computers infected with Gauss since late May. It estimates the total number of victims is in the tens of thousands. The largest number of infections were found were in Lebanon, followed by Israel and the Palestinian Territories.

Is Gauss still a threat? Yes. Infected USB drives could still launch attacks. Servers that controlled infected machines were shut down in July, so it is unlikely that any more information will be stolen from the surveillance part of the operation.

Why is it called Gauss?The virus is built using modules with internal names that appear to be inspired by famous mathematicians and philosophers, including Kurt Godel, Johann Carl Friedrich Gauss and Joseph-Louis Lagrange. Kaspersky named the entire operation after the Gauss component as it implements the data-stealing capabilities

Comments

Popular posts from this blog

What is the difference between a frigate,cruiser,destroyer, battleship ?

Usually the size and the purpose. The period of time sometimes distinguishes the name.Modern navy combat ships are generally divided into seven main categories. The categories are: Aircraft Carriers, Battleships, Cruisers, Destroyers, Frigates, Submarines, and Amphibious assault ships. There are also support and auxiliary ships, including the minesweeper, patrol boat, and tender. During the age of sail, the ship categories were divided into the ship of the line, frigate, and sloop-of-war. Frigate Frigate is a name which has been used for several distinct types of warships at different times. It has referred to a variety of ship roles and sizes. From the 18th century, it referred to a ship smaller and faster than a ship-of-the-line, used for patrolling and escort work rather than fighting fleet actions. In modern military terminology, the definition of a frigate is a warship intended to protect other warships and merchant marine ships and as anti-submarine warfare (ASW) combata

The 101 Most Useful Websites

Here are my picks for the 101 most useful websites of the year. The Most Useful Websites and Web Apps The sites mentioned here, well most of them, solve at least one problem really well and they all have simple web addresses (URLs) that you can easily learn by heart thus saving you a trip to Google. 01.   screenr.com   – record movies of your desktop and send them straight to YouTube. 02.   bounceapp.com   – for capturing full length screenshots of web pages. 03.   goo.gl   – shorten long URLs and convert URLs into   QR codes . 04.   unfurlr.come   – find the original URL that’s hiding behind a short URL. 05.   qClock   – find the local time of a city using a   Google Map . 06.   copypastecharacter.com   – copy special characters that aren’t on your keyboard. 07.   postpost.com   – a better search engine for twitter. 08.   lovelycharts.com   – create flowcharts, network diagrams, sitemaps, etc. 09.   iconfinder.com   – the best place to find icons of all sizes. 10.

How does a search engine fetch answers to your queries in less than second?

Ever wondered how does a  search engine  fetch answers to your  queries  in less than second?  Google  says it's a mixture of science, creativity, experimentation and cold, hard maths. This is how it works: