Quick Links: SpywareGuide Greynets Blog | SpywareGuide Product Database | SpywareGuide Company Database | SpywareGuide Categories
SpywareGuide powered by FaceTime Security Labs
Search SpywareGuide Greynets Database & Site
Security Email Alerts & Updates
Search the Blog
 
Recent Posts
Categories
Monthly Blog Archives
Links
Subscribe
Subscribe to this blog's feed
About the Blog
About SpywareGuide Greynets Blog
Link to Us
Link to SpywareGuide.com

« Hasdoneit.com - Don't Do It! | Main | Facebook Accounts Hijacked, Child Torture Pics Uploaded to Profile? »

  • Easy Does It: Infection Files For All

There comes a time in every script kiddies life when they think, wow, I need to make some horrible infection files. Of course, there are people out there who cater to these desires with increasingly slick infection creation tools. Take this one, for example:

uvl1.gif

Firing up the application presents you with this:

http://blog.spywareguide.com/upload/2008/03/uvl2-thumb.gif
Click to Enlarge

The interface is extremely slick and even has a panel where you can get updates on the latest news. Currently, it says (translated from German):

"Version 2

Sun. Version 2 is finally Releast. Done a lot, we have given you the Stealen as simple as possible.

Added to V2:

-- Email function now Dynamic
-- Skin Changer
-- News window
-- Improved Method Steam Steal
-- PC Info Stealing
-- Icon Changer
-- Delete server after launching "fixed.
-- "Hide server after Launching"
-- "Invisible server in Task Manager"
-- "Kill Antivirus System"
-- Server Downloader erstellbar

Here, the anti-virus Kill List: http://xxxxxxxxxxxxxxxxxx"

Yep, there's an anti-virus kill list (quite a large one, too). Here's a small portion:

http://blog.spywareguide.com/upload/2008/03/uvl3-thumb.gif
Click to Enlarge

The "Extras" folder contains a number of fake icons you can use for your brand new infection file:

http://blog.spywareguide.com/upload/2008/03/uvl4-thumb.gif
Click to Enlarge

As you can see, there are numerous avenues of scammery and social engineering you can pursue when using this program. You can tell it to target certain kinds of user data to steal, delete the file once activated, disable firewalls and task manager - they even include push-button access to take you to sites where you can create email addresses / server accounts to send stolen data once obtained. Here's my infection file:

uvl5.gif

Once the file is run by the victim, they'll see your custom-made error message to make them think they simply have a faulty download:

uvl6.gif

At that point, the infected PC is all yours and you can beam home the data to the accounts specified in the application:

http://blog.spywareguide.com/upload/2008/03/uvl7-thumb.gif
Click to Enlarge

...or at least, it would do if it didn't break every time it attempted to send home stolen data:

uvl8.gif

Hopefully, this crippled EMail functionality will lessen the damage done in terms of stolen personal information from the PCs of victims. At least for a while...

  • TrackBack

TrackBack URL for this entry:
http://blog.spywareguide.com/mt/mt-tb.cgi/290


Post a comment

(If you haven't left a comment here before, you may need to be approved by the site owner before your comment will appear. Until then, it won't appear on the entry. Thanks for waiting.)


Site EULA | Site Map | Contact Us | About Us | Site and Spyware FAQ | Advertise | RSS Feeds  | Link To Us | SpywareGuide JapanJapanese

© Copyright 2006, FaceTime Communications, Inc. All rights reserved.