搜索此博客

2012年8月15日星期三

Trojan that can decrypt files


 If we have left our keys inside the house, we would ask professional craftsmen for help to open the door. With special tools, craftsmen can open the door easily. This magical technology is picked up by Trojan. There is a kind of Trojan stealing secret keys and it is widely spreading through the Internet. According to the analysis of security experts, this kind of Trojan is aimed at public keys ring and secret keys ring of PGP encryption software. You should know that PGP is the most common encryption software that many confidential institutions and business companies are employing, including United States Department of Defense.
  
Security experts have said that "Unlocking Trojan" spreads through mails. Once receiver opens the attachment, Trojan will inquire ten types of files in computer automatically: doc, docx, txt, xls, xlsx, pdf, ppt, pps, PKR, and SKR, and then send the file information to the appointed server of hackers. The first 8 kinds of files are common official documents. PKR and SKR files are Public Keys Ring and Secret Keys Ring. That means the keys of our doors.
  
If PKR and SKR files are acquired by "Unlock Trojan", it means all encrypted files by PGP in the computer will be accessed by hackers. "Unlock Trojan" even collects all IP addresses, MAC addresses, and computer names of infected computers, and spreads aiming at specific goals by mails. It carries obvious business spy characters and is very dangerous.
  
It is said that business Trojan programs like "Unlocking Trojan" are many. As common computer users, we should be very careful about business Trojan. There are some advices for you to avoid business Trojan:
  
1. Put the website addresses of spy software into the shielding list by yourself or by using software.
2. Update Windows operating systems in time, and download patches for leaks of Internet Explorer.
3. Do not receive mails from unknown sources, nor open the attachments.
4. Install a powerful anti-virus software, and switch on real time monitoring function.
5. Partition disk reasonably, and wipe data that are useless or transferred regularly.


Do you feel puzzled about the fifth point? You may think that partition management has nothing to do with defending business Trojan. Actually, it is not correct. Partition management can be efficient for defending Trojan. You should know that everyday there will emerge a large number of Trojan programs. When some computers have been attacked by new Trojan program, we should send the information to anti-virus software manufacturers, and then the manufacturers can add the information to virus database so that anti-virus software is able to find and kill this kind of Trojan.
  
It means that in a long period of time after new Trojan is born, anti-virus software is not able to find or kill it. At this time, reasonable partition shows its necessity. It is because even if your computer is attacked by Trojan, reasonable partition keeps Trojan from invading all disk spaces, leaving enough time for you to transfer data or scan and kill virus.
  
If you feel difficult to partition the disk reasonably because built-in disk management tool has many disadvantages about partition management, you should rely on professional third-party partition magic to help you manage disk and partition. It is strongly suggested to use MiniTool Partition Wizard. It has very powerful and comprehensive partition management functions. Its Wipe Data function allows users to wipe data thoroughly so that you can do the fifth suggested points as the above, avoiding many troubles.

没有评论:

发表评论