Worm_autorun.boj


 
Thread Tools Search this Thread
Special Forums Cybersecurity Malware Advisories (RSS) Worm_autorun.boj
# 1  
Old 05-19-2008
Worm_autorun.boj

This worm may be downloaded from remote sites or dropped by other malware.
It drops copies of itself in all physical and removable drives.
It opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system.
It uses the following icon similar to a legitimate application to entice users into clicking it.
Image
It connects to a possibly malicious URL. However the said URL is inaccessible as of this writing.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
KF(1)							    BSD General Commands Manual 						     KF(1)

NAME
kf -- securely forward tickets SYNOPSIS
kf [-p port | --port=port] [-l login | --login=login] [-c ccache | --ccache=ccache] [-F | --forwardable] [-G | --no-forwardable] [-h | --help] [--version] host ... DESCRIPTION
The kf program forwards tickets to a remote host through an authenticated and encrypted stream. Options supported are: -p port, --port=port port to connect to -l login, --login=login remote login name -c ccache, --ccache=ccache remote cred cache -F, --forwardable forward forwardable credentials -G, --no-forwardable do not forward forwardable credentials -h, --help --version kf is useful when you do not want to enter your password on a remote host but want to have your tickets one for example AFS. In order for kf to work you will need to acquire your initial ticket with forwardable flag, i.e. kinit --forwardable. telnet is able to forward tickets by itself. SEE ALSO
kinit(1), telnet(1), kfd(8) Heimdal July 2, 2000 Heimdal