Malign coders have created a new version of a tool that dumbs down the process of creating Trojan horse malware. Shark 2 can be used to create Trojans capable of stealing confidential data, or backdoor programs that can be used to surreptitiously capture images from infected PCs, among other things. The tool is being …
Hack the Hackers
Could some white hat hacker please release an updated version of this toolkit that "phones home" to the FBI when installed?
Re: Hack the Hackers
Sure. Can you get me a copy of the source?
Kills the hack with the source...
@ A. Merkin;
Come on, isn't it too easy with the code.
Some shark infecting thingy would be much more fun.
Anyway I would not be too scared of these kind of tools.
Vista is DOA anyway and XP ageing... Another treat is not significant anymore. Long live nix kernels based system and their half proper security models.
asshat troll I know better than to feed you but the last thing anyone in Linux land wants is more zombie windows boxes because while it slows the interwebs down to a crawl those people are totally unaware anything is wrong and we suffer too we still get the spam our sites still get ddosed and our grannies still have their cc information stolen we may think you should switch none of us think you should be victimised thats kind of the point troll to not let people be victimised and we have to fight crap FUD and corporate swill all the time to try and help it's shit but we never stop it's too important to stop. What this trojan kit basically does is allow one trojan author to distribute his trojan in slightly different ways but the code is good and will cause a lot of grief I hope it can be tracked and the douche arrested soon.
Re: Alan Donaly
Learn some grammar.
Re: Alan Donaly
aren't you supposed to wait till friday
before ranting like a loon and cheering me up
thanks for bringing it forward today
How would you ensure you'd gotten your hacking toolkit from a 'trusted' source? As opposed to dealing with someone who turns out to be in law enforcement, or perhaps someone who has carefully tweaked it to add backdoors to all the little trojans it produces? I would be in no hurry to go and buy a copy.
Perhaps it already hacks the hackers
I sure wouldnt trust a tool to write trojans to not have any already included in it and lets be honest if I needed this tool to write stuff then I probably wouldnt know enough to check if it was infected.
Personally I think it would be fitting justice if in the attempt to infect others they got infected themselves
- Boffins attempt to prove the UNIVERSE IS JUST A HOLOGRAM
- China building SUPERSONIC SUBMARINE that travels in a BUBBLE
- Review Raspberry Pi B+: PHWOAR, get a load of those pins
- Experimental hypersonic SUPERMISSILE destroyed 4 SECONDS after US launched it
- That 8TB Seagate MONSTER? It's HERE... (You'll have to squint, 'cos there are no specs)