![]() These commands are unrelated and can be performed by the Trojan separately.Īttackers have been using this malware to spread the file infector Win32.Sector. The Trojan can also execute two commands: 1) perform a network scan according to a specified range of IP addresses and 2) mount a dictionary attack. More information about Trojan.Skimer.19 can be found in a corresponding publication on Doctor Web's site.Īlso in March, Doctor Web's virus analysts examined the program Trojan.Rbrute, which is designed to crack Wi-Fi-router access passwords through brute force attacks and to switch out the DNS server addresses in the settings of these compromised devices.
0 Comments
Leave a Reply. |