Custom Trojan Creation Tool Sold Online 121
Finch writes "Net Security.org is reporting on the surprisingly sophisticated 'virus in a can' software called Pinch. Pinch is a tool sold on several online forums and designed to create Trojans. It allows attackers to specify the data that Trojans steal. One of the interface tabs, PWD, allows malicious users to select the type of password to be stolen by the Trojan: from email passwords to passwords kept by the system tools. It is possible to order the Trojan to encrypt this data when sending it, so that nobody else can read it. 'Pinch also lets users carry out other actions: turn infected computers into zombie computers, pack Trojans to make detection more difficult, and kill certain system processes, particularly those of security solutions.'"
Re: (Score:1)
obligatory (Score:2, Funny)
Re: (Score:1)
That sounds like fun (Score:5, Funny)
well you're obviously not the intended market (Score:5, Funny)
Re:well you're obviously not the intended market (Score:5, Funny)
Re:well you're obviously not the intended market (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:2)
I've actually heard that proposed, to send out worms via common holes to go block those holes on unsuspecting victim's computers, as being more effective than making them download patches.
Re: (Score:1)
Re:That sounds like fun (Score:4, Insightful)
Why does the card holder care? Your liability is limited to $50 by law, or zero by many card issuers. Merchants are the ones who lose with fraud, not the card holders or the credit card companies. In fact, the card company profits from fraud by hitting the merchant with a charge back fee in addition to reversing the transaction.
Re: (Score:1)
Re: (Score:1)
nothing special (Score:3, Informative)
Re:nothing special (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:3, Informative)
No seriously, this is not a new idea. There was Senna Spy Trojan Generator [megasecurity.org] many years ago. However, unless the generator actually generates the source code so you can compile it, I would call it a highly customizable backdoor, nothing more.
Re: (Score:3, Funny)
Pardon my asking, but isn't admitting to that rather like stuffing bloody meat down your shorts and swimming with sharks?
Re: (Score:2)
Re: (Score:1)
So the people that write malware indirectly cause increased security.
So this is good news .
Re: (Score:2)
It's a very, very small silver lining on a very dark and expensive cloud that you're describing. The money wasted on expensive and system slowing virus software of limited usefulness could easily go to a backup system and the professional time to administer it, if the onslaught of malware weren't so amazingly aggressive and pervasive. It's especially bad in "public" networks, such as your average Starbucks wi-
Re: (Score:2)
You can draw many parallels between the gun control issue and malware. You don't blame the gun manufacturers for every gun related death do you? Well maybe you do but that's a moral question not a legal one (yet). However, removing all malwa
Re: (Score:2)
No, but firearms have a lawful purpose: to defend your homestead. Malware, other than a learning exercise, has no lawful purpose.
Re: (Score:2)
The difference is well illustrated by the infamous Robert Morris worm case. It was wr
Re: (Score:2)
Malware, other than a learning exercise, has no lawful purpose.
Well you just named 1 pretty big exception in the middle of your rule. I can name others.
Key loggers and traffic loggers are used by many parents to monitor their kids' activities and employers to monitor their employees.
Tools like Sub7 and Optix Pro can be considered merely unpolished, insecure versions of VNC, RemoteAnywhere, etc.
Rootkit-like behavior such as API hooks is used by Firewall and Anti-cheating software such as GameGuard.
Worms and viruses though don't have much of a use other t
Nothing New (Score:5, Informative)
I remember back in my script kiddie days I was able to download programs that would put together a trojan or virus together from the various options the user selected. Press a button and viola! It generated an executable. This was ten years ago.
What's so new here? That fact that someone is commercializing it?
Well, good. If you have to shell out cash at least it will keep my 16 year old self from downloading it and causing annoyances.
Re: (Score:2)
Only 10 years? How about 1992? (Score:4, Interesting)
I still remember the password was chiba city.
Re: (Score:2)
"Mum, look I created my first virus"
They bearly worked and I understood nothing about the internals, but VCL is definately a prime example that this has been done many times before and is nothing new.
Re: (Score:1)
Re:Nothing New (Score:4, Funny)
Being able to pop custom modals was pretty fun, too. "ERROR: Insert penis into CD-ROM drive to continue operation! [OK]," followed by the CD tray immediately ejecting itself, probably freaked a few people out.
Oh, to be young again, those were the days...!
Re: (Score:1)
Re: (Score:3, Funny)
Re: (Score:2)
It also makes it all that more irritating and pathetic.
Difference between Good and Evil (Score:3, Insightful)
I guess that's the difference between real tao programmers and script kiddies.
I _could_ have engaged in the same things that script kiddies did, exploiting other people for personal amusement and/or gain, but made a conscious decision not to. I saw the links, I looked at the downloads, the ftp sites, and the web
Re: (Score:2)
You qualify for the standard response...
Thank you for visiting Slashdot, yet again, to post a followup to my wr
I'm not scared... (Score:3, Funny)
With Winnuke95.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re:Scary stuff to be sure (Score:5, Insightful)
Never mind the fact that it's a fucking KIT. If YOU can download it, so can the anti-virus people in order to figure out how to detect viruses made with it.
The interesting thing about modern viruses/trojans/whatever is that very few of them are really *viruses* anymore. They rely almost completely on simply getting a user to manually run (or at least give permission to the system to run) an obfuscated executable. It's sad that the technique is so successful.
After all those (Score:5, Funny)
Re: (Score:2, Funny)
1NCRE@SE Y0UR PEN1S S1ZE 25% 1N 2 WEEKS!" programs I definitely need custom Trojans.
Ah, that is unless you've followed the instructions from this oldie but goodie:
--
Follow these instructions EXACTLY, and in 3 to 6 weeks you will have received well over 50,000 inches of penis, all yours. This program has remained successful because of the inadequacy and vanity of the participants. Please continue its success by carefully adhering to the instructions.
Welcome to the world of Mail Order Penis Enlargement! This little business is a little different than most cosmetic surgery. Your product is n
"Do-It-Yourself Trojans" (Score:2, Insightful)
Re: (Score:2)
Aww yeah! Custom Trojan Creation Tool! Giggety! (Score:4, Funny)
What I wonder... (Score:2)
-matthew
Yeah, and no drug dealer would do that... (Score:2)
The price of the server is peanuts. (Score:2)
I'd like to see the EULA (Score:2, Funny)
Re: (Score:2, Funny)
By agreeing to the purchase and install of Trojan-o-Matic, hereby called the 'Software', you agree to host 'x' amount of porn or phishing sites. The amount is determined by the Software according to its use and the creator of the software. At any time, you submit your computer to be a host server for the Software Creator's Nigerian email server. That is all.... oh, and your bank account is empty.
Re: (Score:3, Funny)
I reserve the right to go ballistic on your ass if you rip me off. (But feel free to redistribute if you include your custom trojan in the file.)
EULA - most other software
[four to six pages of nonsense much of it in all caps, mainly stating the exact same as above with the exclusion of the parenthesis but adding a page or two basically saying "I can also castrate you with a dull wooden spoon if you do something I would rather you pay me extra to get done."]
Torrent? (Score:1, Redundant)
THAT would "show them".
Re:Torrent? (Score:5, Interesting)
You can almost see the scriptkiddies sitting there with their brand new trojan going... "hmm, now if only I had some program to trick people into downloading... something I could merge my trojan with to start off my botfarm. Something I could put on fasttrack, and maybe emule... something idiots would download and run even if their antivirus goes off. Hey wait a minute, I'm an idiot and I just ran pinch even though 'norton' told me it was bad for me!"
Re:Torrent? (Score:5, Insightful)
Did you stop to think that maybe the construction set was identified as a Trojan because it ... you know ... contained the code for a Trojan? As in ... if it tripped your antivirus then you probably had the right one.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
1.20MB: tUboO @ havenwar 867124 1 (uCF)[x].zip
559KB: Angel havenwar 867124 1 [New Version] Vocal.wma
355KB: [LiveStream] havenwar 867124 1 @256kbps Extended.wma
1.30MB: (CDZ) havenwar 867124 1 (full)(Divx).zip
Status is all green checkmarks with multiple sources, reporting 16 or 24KB/s download speed, and some show a five-star rating.
Beginning of a glorious new industry... (Score:1)
Damn, yes I would
security solutions? (Score:2)
Re: (Score:1)
You miss my point. If the user thinks it's ok to run untrusted software (even in cases where the software does not happen to be on anyone's blacklist), then they don't have a security solution. They just have a security illusion. That user could update their signatures 24 times per day, and they'll still be a sitting duck.
If I want you to run my trojan, why would I send a copy of my trojan to your malware-scanning software vendor first? That's like the Greeks sending the Trojans a letter the day before
slashvertisment? (Score:3, Funny)
Name change (Score:2)
These subject lines are killing me.
Re: (Score:1)
Trojans (virus) have a lot in common with the Trojan Horse of mythology. What does Trojan Condoms have to do with Trojans? NOTHING. A BRAND AND LOGO.
I want Spartan Condoms!
Mod me flamebait, but (Score:3, Insightful)
I've seen them spend hundreds of dollars on both prevention and cure, only to get owned again. This isn't about Microsoft, this is about guys that are the seeming equivalent to those that might cut brake lines in a car. The outcome isn't injurious physically, just emotionally/mentally and financially.
My hacker instinct says always continue to hack and explore and try and break things, but selling trojans seems way over the top. No fucking 'let them download Ubuntu or get a second mortgage for a Mac' shit. This is real, this is vulgur, and this is a business plan for bright guys gone bad.... and I don't get paid for scraping this crap.
You fail it. (Score:2)
Re: (Score:1)
I don't want to preemptively answer the counter-arguments to this. I'm right anyway. Normal people don't NEED windows. There is software to do e-mail, web, chat, office, HTPC, taxes, office, whatever - on Linux. And if they need Adobe or other
Re: (Score:2)
<adam savage> Well there's yer problem! </adam savage>
Respectable (Score:1)
Whoever wrote that and released it ... (Score:2)
Re: (Score:1)
Ahhh (Score:1)
Actually... (Score:1)
Because I find it amusing that they can write these articles and not give any useful information as to what systems are affected buy such a program.
But then I guess most of us already know the answer.
Free Trial (Score:1)
Oh, wait...
Any skilled Hacker (Score:1)
The Future of Anti-Virus (Score:3, Interesting)
Re: (Score:1)
Re: (Score:1)
If the LiveCD is good enough, it will detect the minimal hardware needed to do its job
Is it free and open source? (Score:1)
Custom Trojans (Score:1)
ahhh.... who am I kidding....??
Re: (Score:2)
I like my trojan to have a custom fit too (Score:1)
Re: (Score:2)
Way to break the mood!
Re: (Score:3, Informative)
Hate to be the one who bears bad news. And by the way, "boxen" is not a real word either.