YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

New Trojan Threatens Even “Safe” Networks

Posted On 18 Mar 2009
By : admin

CYBERSPACE — A new malware attack capable of compromising a variety of networked devices — even ones that are hardened or don’t utilize a Windows operating system — has security experts worried.A new variant of Trojan.Flush.M, a malicious DNS hijacker first discovered in December, takes over entire networks by establishing a rogue dynamic host configuration protocol server on a networked host. Other devices sharing the same LAN are tricked into using a malicious domain name server which routes DNS requests to expertly spoofed URLs. The subterfuge is particularly difficult to detect, because the trojan doesn’t specify a DNS domain name. Instead, it uses at least two IP addresses: 64.86.133.51 and 63.243.173.162.

The trojan also sets the DHCP lease time to one hour and sets the MAC destination to the broadcast address rather than the MAC address of the DHCP client

“This kind of malware is definitely dangerous, because it affects systems that themselves are not vulnerable,” SANS Internet Storm Center Chief Technical Officer Johannes Ullrich told The Register. “So all you need is one system infected in the network and it will affect a lot of other nonvulnerable systems.”

One potential solution is to hardwire DNS server settings into all networked apparatuses, which will cause the devices to bypass any rogue DNS servers introduced into the LAN by Trojan.Flush.M.

In addition, Ullrich recommends sysadmins “monitor connections to DNS servers other then the approved one pushed out by your DHCP server. This should help you spot this kind of malware. Yes, you can block the two IP addresses, but it will likely do little good,” because future variants undoubtedly will change IPs.

  • google-share
Previous Story

Italian Porn Star Charged with Obscene Stock Market Protest

Next Story

Second Life to Crack Down on Adult Content

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • ImLive
    Live Cam Affiliate Programs
  • Vic Bava, CPA – Accounting & Tax
    General Business Services
  • 101 Marketing
    Adult Talent Agencies
  • Premiere Listing

    Live Studio

    More Details

RECENT

POPULAR

COMMENTS

XMediaShop Releases Spinner Magazine Issue #3

Posted On 03 Jul 2025

DD White Takes Control in 'The Bachelor Party'

Posted On 03 Jul 2025
Pineapple Support

WannaCollab Joins Pineapple Support As Supporter-Level Sponsor

Posted On 03 Jul 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy