back to article Instant trojan to worm toolkit sighted

Miscreants have created a point-and-click toolkit designed to make it easier to both create and distribute Trojans. The Trojan2Worm (T2W) toolkit turns any executable file into a worm with auto-spreading capabilities. As such it provides the ability for Trojan infection agents to acquire worm-like spreading abilities. The …

COMMENTS

This topic is closed for new posts.
  1. Dam
    Pirate

    PRAYING

    I'm praying for it to actually contain a keylogger so the script kiddies get self pwnd :p

  2. Andre
    Happy

    Typical...

    All the good software is for Windows. What about us Mac users???

  3. Gordon Pryra

    The industry can learn a lot...

    About a nice layout and ease of use from these boys

  4. Anonymous Coward
    Anonymous Coward

    Nothing new.

    Virus and malware kits have been around for donkeys, I remember playing virus builder kits back around 1989. They are quite fun, especially when you start decompiling them to see what's happening inside. More than likely this is one of those ones put together using one of those AIO multimedia builder things. Usually by the time the kits are in the mainstream the AV companies have cataloged them to death, so the output is pretty much useless against popular AV vendors.

  5. 4a$$Monkey
    Pirate

    Backdoor

    I'll bet it also puts in a backdoor that allows the tool kit authors to install their own malware / botnet clients

  6. Ru
    Unhappy

    Comic sans?

    Bleah. Is nowhere safe from this insipid typeface?

  7. Danny
    Linux

    hurrah! bsod decends on windows

    Nasty. Being boiled is too good for them. More cruft for s'kiddies to abuse Windows lusers. Article is thin on how the worm propagates. I'm guessing that a firewall will keep the bugger out and that it's intended as an email attachment that will run an internal (Windows) intranet ragged.

    And how does a UFD infect your machine? Does Windows really autorun from UFDs? Or is this U3 or whatever nonsense? Will Microsoft never learn. Doesn't affect Linux of course.

    Anyway, as ever the cure is get a real OS and install Linux.

  8. Matt

    Poison pill?

    And what are the odds that this "noob-friendly" tool quietly installs a rootkit on the unsuspecting scriptkiddy's PC for later exploitation? The user base of judgementally-challenged bozos who wouldn't think twice about running an "instant revenge kit" to wreak havoc on the PC of someone who wouldn't add them as a friend on MySpace must be huge.

  9. Elmer Phud
    Pirate

    So pleased . . .

    . . . to see us older folks being catered for. I can't do code so it's one in the eye for the whippersnapper scriptkiddies. With a simple point and click interface it could be taken up by silver surfers. Be afraid, the grumpy generation may be about to fight back.

  10. Aaron Harris
    Pirate

    Infect the infectors

    Can someone not create a honey-pot version of the software, that infects the wood be slackers (Hacker that can’t be bothered to do it properly) PC when downloaded?

  11. shaun
    Joke

    Script Kiddies Strike Back

    To cries of, "These are not the programmers your looking for", "You don't need to see my C++ Certificate" and "I'm not your End User"

  12. Fuion
    IT Angle

    @Elmer Phud

    I think the real question here is:

    "If 0wning a PC is point and click, surely securing said PC should also be"

    As for : "surely securing said PC should also be"

    ---> Looks like the "bad guys" work in teams, internetworking - when is the security industry going to do the same, and release similar tools for end users?

    Is this not the proper way for such "SilverSurfers" to fight back ?

  13. Anonymous Coward
    Anonymous Coward

    yeah but...

    does it run on wine?

  14. Anonymous Coward
    Stop

    This is just sad ...

    Microsoft have had a utility that allows ANY executable to run unchallenged as a Win32 service for yonks.

    How is this any different?

    The author of this piece needs to actually learn some programming; like IT employment agencies need to actually employ “consultants” who actually know what the fuck they are slavering about before asking you dim-witted questions. A background in IT (or at least the ability to actually operate a computer beyond turning it on) would be a start.

  15. Anonymous Coward
    Linux

    The sad thing is (one of many sad things)

    ...that it probably is more stable than MS's commercial software, more compatible, and more user friendly. I wonder if it has a listing in add/remove programs to be uninstalled? (probably it's stand-alone and doesn't need such crap) And another sad thing is that these are obviously talented (although criminal) guys, that will probably never hold a high-paying, "respectable" job, with opportunity for growth, like MS would provide if these guys could get their feet in the door. Instead, they'll cause much human misery out of bitterness, indifference, and the sheer lack of opportunity that life (and their own choices) has provided them. They'll probably erratically make a few thousand or tens of thousands of dollars off their malware kit before being shaken down and incarcerated, mostly because of their own idiot bravado, while less talented (but more emotionally mature and experienced) developers coast on making their way in the world. <sigh> All of life disgusts me today...

  16. Anonymous Coward
    Coat

    Good to see clean separation of text from interface

    You don't often see that level of professionalism nowadays.

    Multi-language support from the getgo.

    Got to lurve reflection effect on the application title, quite daring in design.

    And isn't a Panda an endangered species?

    Quite a lot of stuff is coming out of Spain, at the mo, perhaps crackers prefer tans?

    Of course everything is possible at the click of a button, if some poor sap has written all the code underneath :)

    I am getting my cow hide coat and going out through the back orifice.

  17. amanfromMars Silver badge
    Alien

    What are you talking about?

    "A background in IT ...." ..... By Greg Fleming Posted Wednesday 18th June 2008 17:58 GMT

    Bonded Gilt Territory, Mr Fleming, ..... at ITs Uppity Echelons? A Fore Grounding in Intelligence will always render Substance to Shared Vision.

    One of Blighty's Mighty Invisible Exports? ...... Proxy Virtual Systems Support ..... AI Facilitation and AIMentoring. ...... or a Private Offering to the Markets for CyberIntelAIgents? ...... with nothing to hinder IT being at least all five and therefore probably infinitely scalable/adaptable.

  18. amanfromMars Silver badge
    Alien

    Capital Assault or Banking Rules Change? Dealers Choice.

    "Of course everything is possible at the click of a button, if some poor sap has written all the code underneath :)" .... By Anonymous Coward Posted Thursday 19th June 2008 05:39 GMT

    Those poor saps will never ever be poor again, AC....... and they will Know All About the Value of Wealth and what you do with IT.

  19. Anonymous Coward
    Alert

    this just in from McAfee

    Notice

    This is a Low-Profiled Threat Notice for HTool-T2W

    Justification

    HTool-T2W has been deemed Low-Profiled due to media attention at the following link: http://www.theregister.co.uk/2008/06/18/trojan_worm_toolkit/

    Read About It

    Information about HTool-T2W is located on VIL at: http://vil.nai.com/vil/content/v_146248.htm

    Detection

    HTool-T2W was first discovered on June 25, 2008 and detection will be added to the 5325 dat files (Release Date: June 25, 2008).

    Though we consider this a low threat, An EXTRA.DAT file may be downloaded via the McAfee AVERT Extra.dat Request Page: <https://www.webimmune.net/extra/getextra.aspx>

    If you suspect you have HTool-T2W, please submit a sample to <http://www.webimmune.net>

    Risk Assessment Definition

    For further information on the Risk Assessment and Avert Labs Recommended Actions please see: <http://www.mcafee.com/us/threat_center/outbreaks/virus_library/risk_assessment.html>

    For breaking security information from McAfee® Avert® Labs visit:

    McAfee Avert Labs Blog

    http://www.avertlabs.com/research/blog

    AudioParasitics - The Official PodCast of McAfee Avert Labs http://podcasts.mcafee.com/audioparasitics

    Sign up for McAfee® Avert® Labs Security Advisories http://www.mcafee.com/us/threat_center/securityadvisory/signup.aspx

This topic is closed for new posts.

Biting the hand that feeds IT © 1998–2019