ICE: Warning for a Java Trojan that intercepts everything

The Electronic Crime Prosecutor's Office informs citizens of the appearance of Malware Trojan.

trojan

This malware intercepts user information (usernames, mails, passwords), takes snapshots of (printscreens), accesses the camera, downloads and executes files, updates its configuration and "silently" forwards the collected information to a remote server.

Trojan is spread through infected and unwanted emails, and in order to execute, the "Runtime Environment" program must already be installed on the computer

Internet users are urged to avoid harming their computers with malicious software, to take the necessary protection measures

The Cybercrime Prosecution Directorate informs the citizens - Internet users about the appearance of malicious software, type "Trojan Horse" (Trojan) in our country, which spreads through infected and unsolicited "Spam e-mails".

Regarding the possibilities of this Trojan, it can:

  • to intercept user information (usernames, mails, passwords),
  • to receive instant printscreens,
  • access the camera, download and run files,
  • to update its configuration and
  • to silently forward the information collected on a remote server - server,
  • to enter computers "camouflaged" as a regular program.

In particular, "java archive file" software runs in the background and creates security holes in the system, giving access to third parties, and in order to run, the Java Runtime Environment program must be installed on the computer.

To prevent malicious software from being compromised, the Electronic Crime Prosecution Directorate invites citizens to take the necessary digital protection and security measures, namely:

  • Use firewalls (), capable of preventing inbound connections to services, which should not be publicly available, and allowing only individual services outbound.
  • Use passwords that are difficult to recover.
  • Use up-to-date "antivirus" protection programs, genuine software programs, and regularly update updates.
  • Grant the lowest level of permissions to users and programs where needed to run a process.
  • Disable the "», προκειμένου να παρεμποδίζεται η execution of files on the network and on disks as well as to activate the "read-only" reading option in cases where "write access" right is not required.
  • Do not open attachments of emails, whose source and content they do not know, and set up their mail server so that they are not allowed to enter or automatically delete exe file attachments .vbs, .jar, .bat, .scr, widely used for virus propagation.
  • Disable File Sharing feature where it is not required.
  • To create backup copies at regular intervals "» of their device files, to an external storage medium

It is recalled that citizens can communicate, with anonymity or surname, with the Electronic Crime Prosecutor's Office in order to provide information or to report illicit or scandalous acts or activities carried out over the Internet to the following contact details:

  • telephone: 11188
  • Sending e-mail to: ccu@cybercrimeunit.gov.gr
  • Through the application for smart phones: CYBERKID
  • Through twitter: @ CyberAlertGR

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.081 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).