SurfControl Warns of Spoof

SurfControl warns Internet users of a malicious Trojan keylogger inside

Dark Reading Staff, Dark Reading

November 13, 2006

1 Min Read
Dark Reading logo in a gray background | Dark Reading

SCOTTS VALLEY, Calif. -- SurfControl (London: SRF), the leading provider of global on-demand, network and endpoint IT security solutions, is currently tracking a malicious Trojan keylogger concealed in a spoofed e-mail message claiming to be from Adobe. The e-mail asks users to download the latest version of Adobe Reader 7.0.8.

Clicking on the link in the e-mail downloads a Trojan keylogger that, after executing, will then download additional malicious files and will monitor the user's browser, potentially stealing the user's confidential data. The threat then opens the relevant Adobe read me page in the browser in order to appear legitimate. Additionally, the threat also installs malware that utilizes the infected user's computer as a zombie, to send out spam e-mails that appear to come from Microsoft advertising Windows Live Messenger. These spammed e-mails link to malware files on another server, similar to the malware in the original Adobe spoof e-mail.

SurfControl's Threat Analysis and Research department is uniquely positioned to provide protection through its Adaptive Threat Intelligence Service that spans the globe and across all products. Around-the-clock exchange of information on new threats allows SurfControl's Threat Experts to be at the forefront of Internet protection. SurfControl adds any new signatures, rules and/or URLs to all products in the SurfControl Enterprise Protection Suite.

SurfControl plc

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights