To hack or not to hack MSN accounts
June 2010
IT in Manufacturing
A mass mail invitation to a suspicious 'do-it-yourself' account hacking session puts Windows Live Messenger users at risk.
The e-mail marking the first step of this data harvesting scheme is very likely to go down in the history of cybercrime-generated fiction on human behavior - claiming that if you tell people something is illegal, they will not do it. This is how the promised tool gets the thinnest of all legitimacy coatings: “This tool could be used by hackers to hack MSN password, it should not because Windows Live password hacking is illegal! […]”.
Much like a wolf trying really hard to grow a thick coat of wool and develop a persuasive bleating technique, this tool is allegedly intended for '[…] the use of owners to hack their own MSN accounts […]' and for 'forensic scientists'.
Far be it from me the idea of preaching complete distrust in our fellow humans and their natural generosity! However, the logic of this message is quite puzzling. The final reference to the tool being valid for situations in which you are '[…] able to login without having to enter your password' adds to its sci-fi aura.
Such in-depth analysis of the meaning of every e-mail that you receive may not be your favorite pass time, but any claim to rendering password recover easier is quite hilarious in an age when you can never be too cautious about personal data theft.
Literary analysis aside, the promised tool is supposed to be downloaded using the link embedded in the message. And here is when HackMsn.exe drops its mask and reveals that it is a backdoor at heart.
Identified by BitDefender as Backdoor.Bifrose.AADY, this piece of malicious code affects Windows platforms. The malware injects itself into the explorer.exe process and opens up a backdoor that allows unauthorised access to and control over the affected system.
Moreover, Backdoor.Bifrose.AADY attempts to read the keys and serial numbers of the various pieces of software installed on the affected computer, while also logging the passwords to the victim’s ICQ, Messenger, POP3 mail accounts, and protected storage.
This is not the first campaign aiming to disseminate this piece of malware. You can find out the details of another scheme it has been part of on the Malwarecity Blog
For more information contact Alina ANTON, senior PR and Marketing Coordinator, EMEA & APAC Business Unit, BitDefender, +40 212 063 470, [email protected], www.bitdefender.com
Further reading:
Why choose between Capex and Opex if you can Totex?
Schneider Electric South Africa
IT in Manufacturing
In a sector marked by cyclical demand, high capital intensity, and increasing regulatory and sustainability pressures, mining, minerals and metals (MMM) companies are re-evaluating how they approach procurement and investment.
Read more...
AI and the smart factory
Schneider Electric South Africa
IT in Manufacturing
Imagine walking into a factory where machines can think ahead, predict problems before they happen and automatically make adjustments to realise peak performance. This isn’t science fiction, it’s happening right now as AI continues to transform how we run industrial operations.
Read more...
Why your supply chain should be a competitive advantage
Schneider Electric South Africa
IT in Manufacturing
The last five years have placed unprecedented strain on global supply chains. Leading companies are turning the challenge into an opportunity to transform their supply chains into a competitive advantage.
Read more...
Why AI will never truly understand machines
Wearcheck
IT in Manufacturing
Cutting-edge technology and solutions powered by AI are embraced by specialist condition monitoring company, WearCheck, where the extreme accuracy of data used to assess and diagnose machine health is paramount.
Read more...
Buildings and microgrids for a greener future
Schneider Electric South Africa
IT in Manufacturing
Buildings are no longer passive consumers of power. Structures of almost every size are evolving into dynamic energy ecosystems capable of generating, storing and distributing their own electricity. Forming part of this exciting transformation are microgrids.
Read more...
Traditional data centres are not fit for purpose
IT in Manufacturing
Traditional data centre designs are falling short, with nearly half of IT leaders admitting their current infrastructure does not support energy or carbon-reduction goals. New research commissioned by Lenovo reveals that data centre design must evolve to future-proof businesses.
Read more...
AI agents for digital environment management in SA
IT in Manufacturing
The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. Among the technologies changing the pace of business are AI agents - autonomous, task-driven systems designed to operate with limited human input.
Read more...
AI-powered maintenance in future-ready data centres
Schneider Electric South Africa
IT in Manufacturing
The data centre marketplace often still relies on outdated maintenance methods to manage mission-critical equipment. Condition-Based Maintenance (CBM) is powered by AI and is fast becoming a necessity in ensuring both competitiveness and resilience.
Read more...
Powering up data centre mega development
IT in Manufacturing
Parker Hannifin has secured a major contract to supply key equipment for nearly 30 aeroderivative gas turbines powering a new hyperscale data centre in Texas.
Read more...
Building resilient supply chains through smarter e-procurement
RS South Africa
IT in Manufacturing
In a time of constant disruption, from supply chain uncertainty to rising operational costs, businesses that embrace digital procurement are better positioned to stay competitive and resilient.
Read more...