YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

New Trojan Threatens Even “Safe” Networks

Posted On 18 Mar 2009
By : admin

CYBERSPACE — A new malware attack capable of compromising a variety of networked devices — even ones that are hardened or don’t utilize a Windows operating system — has security experts worried.A new variant of Trojan.Flush.M, a malicious DNS hijacker first discovered in December, takes over entire networks by establishing a rogue dynamic host configuration protocol server on a networked host. Other devices sharing the same LAN are tricked into using a malicious domain name server which routes DNS requests to expertly spoofed URLs. The subterfuge is particularly difficult to detect, because the trojan doesn’t specify a DNS domain name. Instead, it uses at least two IP addresses: 64.86.133.51 and 63.243.173.162.

The trojan also sets the DHCP lease time to one hour and sets the MAC destination to the broadcast address rather than the MAC address of the DHCP client

“This kind of malware is definitely dangerous, because it affects systems that themselves are not vulnerable,” SANS Internet Storm Center Chief Technical Officer Johannes Ullrich told The Register. “So all you need is one system infected in the network and it will affect a lot of other nonvulnerable systems.”

One potential solution is to hardwire DNS server settings into all networked apparatuses, which will cause the devices to bypass any rogue DNS servers introduced into the LAN by Trojan.Flush.M.

In addition, Ullrich recommends sysadmins “monitor connections to DNS servers other then the approved one pushed out by your DHCP server. This should help you spot this kind of malware. Yes, you can block the two IP addresses, but it will likely do little good,” because future variants undoubtedly will change IPs.

  • google-share
Previous Story

Italian Porn Star Charged with Obscene Stock Market Protest

Next Story

Second Life to Crack Down on Adult Content

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • XLoveCash.com
    Live Cam Affiliate Programs
  • Lainie Speiser
    Adult PR Agencies
  • Private Cam Sites
    Clips Stores
  • Premiere Listing

    Dao of Leads

    More Details

RECENT

POPULAR

COMMENTS

Haley Spades Appears on the Nudecast series of The Misfit Effect Podcast

Posted On 17 Sep 2025

Andie Anderson & Kaci Kennedy Get Served Up on MILF VR

Posted On 17 Sep 2025

Kyaa Chimera’s Mind Gets Blown for Love Her Films

Posted On 17 Sep 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Someone puts Gal Gadot in one of your vids? Take it down!

Posted On 13 Dec 2017

Hoping viewers can also enjoy a spooky...

Posted On 24 Oct 2023

now a days these type of games will get...

Posted On 17 Jul 2023

good move from adent. these type of...

Posted On 06 Jul 2023

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy