Panda Virus Alert: Trj/Briz.A [complex malware]

Discussion in 'malware problems & news' started by Randy_Bell, Feb 24, 2006.

Thread Status:
Not open for further replies.
  1. Randy_Bell

    Randy_Bell Registered Member

    May 24, 2002
    Santa Clara, CA
    - PandaLabs uncovers a complex malware creation system
    designed to spy and steal personal data -
    Virus Alerts, by Panda Software (​

    MADRID, February 24, 2006 - PandaLabs has detected a new Trojan called Trj/Briz.A, whose main aim is to steal personal user data from affected computers. This code stands out because it specializes in stealing bank details and data from web forms and that its author customizes the code for hackers.

    The code creation system gives hackers the option to generate a Trojan that cannot be detected by any antivirus protection, as the author checks it every day. In spite of this, TruPrevent(tm) Technologies incorporated in Panda Software's solutions have detected this code without needing to be able to identify it first.

    Apart from the code, cyber-crooks that buy this crimeware also get a complex system for controlling the status of the infection caused by the custom Trojan. This allows the client to get a list containing a large quantity of data about the infected computers: IP addresses, passwords and even the physical location of the computers. In this way, the cyber-crooks can always have their malicious activity under control.

    PandaLabs is working, along with other companies to analyze and close all the sites related to this Trojan.

    The file that causes the Trj/Briz.A infection is called "iexplore.exe" It uses this name to pass itself off as Internet Explorer. When it is run, it downloads different files and stops and deactivates Windows Security Center services and Shared Internet Access. It also collects information on programs like Outlook, Eudora and The Bat, which it sends to the attacker.

    To make it difficult to detect and disinfect the Trojan, it also modifies the hosts file to prevent access to websites related to antivirus products.

    This Trojan is the most complex example of the business network based on malware. Where as hackers used to create malicious code to simply have fun, they now have direct financial goals, designing their creations based on a criminal business model. This data is reflected in the annual report published by PandaLabs, which is available at

    Luis Corrons, director of PandaLabs, explains that "as authors of Internet threats have changed their objective, which is now financial gain, they have also changed the way they design their threats. Therefore, they try to ensure that their creations go unnoticed, to both users and security companies, for as long as possible."

    For users to protect their computers against these codes, "they need technologies like TruPrevent(tm), with which we have been able to detect a code like Trj/Briz.A, which would otherwise have been very difficult to find," says Corrons.
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.