About the Trojan for Linux

Linux Trojan on calling himself ‘Hand of Thief’. Both RSA and ESET ensured the existence of malicious code and its danger. However, after further investigation, it appears that the Trojan is just a typical case of how a thief robs another. How ZDNet reported, there is new evidence showing the true purpose of the Trojan. RSA got the trojan and after building the binary code concluded that HoT has no real function. “Our research and analysis shows that actually HoT skills are very limited, which makes the prototype of malware requires a lot of work before being considered a banking Trojan,” said Yotam Gottesman, senior researcher at RSA. The American publication note explains how Linux security measures remain in effect. Unlike many other viruses, the hand of the thief needs an active user to install the program. “On some operating systems like Windows, you can get a user to install the program […] With Linux, you have to leave the road to install a program. HoT does not have a mechanism to facilitate the installation, “says ZDNet. RSA also retracted on Linux distributions running the virus. Even installing the Trojan, you can not send information in Firefox or Chrome in Fedora and simply not run on Ubuntu. Seems Linux integrity remains intact. Nevertheless, we continue with the recommendation to maintain current systems and a system of protection.




Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s