back to article Shark 2 dumbs down Trojan creation

Malign coders have created a new version of a tool that dumbs down the process of creating Trojan horse malware. Shark 2 can be used to create Trojans capable of stealing confidential data, or backdoor programs that can be used to surreptitiously capture images from infected PCs, among other things. The tool is being …

COMMENTS

This topic is closed for new posts.

Hack the Hackers

Could some white hat hacker please release an updated version of this toolkit that "phones home" to the FBI when installed?

Thanks,

AM

0
0
Anonymous Coward

Re: Hack the Hackers

Sure. Can you get me a copy of the source?

0
0
Anonymous Coward

Kills the hack with the source...

@ A. Merkin;

Come on, isn't it too easy with the code.

Some shark infecting thingy would be much more fun.

Anyway I would not be too scared of these kind of tools.

Vista is DOA anyway and XP ageing... Another treat is not significant anymore. Long live nix kernels based system and their half proper security models.

0
0

a**hat

asshat troll I know better than to feed you but the last thing anyone in Linux land wants is more zombie windows boxes because while it slows the interwebs down to a crawl those people are totally unaware anything is wrong and we suffer too we still get the spam our sites still get ddosed and our grannies still have their cc information stolen we may think you should switch none of us think you should be victimised thats kind of the point troll to not let people be victimised and we have to fight crap FUD and corporate swill all the time to try and help it's shit but we never stop it's too important to stop. What this trojan kit basically does is allow one trojan author to distribute his trojan in slightly different ways but the code is good and will cause a lot of grief I hope it can be tracked and the douche arrested soon.

0
0
Anonymous Coward

Re: Alan Donaly

Learn some grammar.

0
0

Re: Alan Donaly

aren't you supposed to wait till friday

before ranting like a loon and cheering me up

thanks for bringing it forward today

db

0
0
Ru

So,

How would you ensure you'd gotten your hacking toolkit from a 'trusted' source? As opposed to dealing with someone who turns out to be in law enforcement, or perhaps someone who has carefully tweaked it to add backdoors to all the little trojans it produces? I would be in no hurry to go and buy a copy.

0
0

Perhaps it already hacks the hackers

I sure wouldnt trust a tool to write trojans to not have any already included in it and lets be honest if I needed this tool to write stuff then I probably wouldnt know enough to check if it was infected.

Personally I think it would be fitting justice if in the attempt to infect others they got infected themselves

0
0
This topic is closed for new posts.

Forums