|
|
|||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||
Editions | myCNN | Video | Audio | Headline News Brief | Feedback | ![]() |
![]() N. Y. plans to heal skyline Stocks rise on Case departure Lieberman's presidential announcement today New arrests may be linked to UK ricin scare (MORE)
![]() Jordan says farewell for the third time Shaq could miss playoff game for child's birth Ex-USOC official says athletes bent drug rules (MORE)
![]() | ![]() |
|||||||||||||||||||||||||||||||||||||||
| ![]() |
Virus may steal AOL users' passwords
(IDG) -- Members of AOL Thursday were warned to be on the lookout for a trojan horse virus that can steal their passwords, potentially allowing a hacker to access their e-mail and other personal information. The virus, dubbed APStrojan.qa, emerged Jan. 25 and is the most active in a string of similar viruses affecting AOL users that have been identified over the past year, according to antivirus software vendor McAfee.com. In the past 30 days reports of the virus have doubled, said April Goostree, a virus research manager at McAfee.com. AOL Time Warner is the parent company of CNN.com. It wasn't clear exactly how many users have been affected, but the number is "significant," Goostree said. The virus has been rated medium-risk for AOL users, and low-to-medium-risk for corporate users.
A trojan virus is a malicious program that arrives disguised as a harmless application but in fact carries a nasty payload. The AOL trojan takes the form of an attachment named "mine.zip" and spreads itself in an e-mail bearing the subject line "hey you." Text in the body of the message suggests that the attachment contains scanned images, McAfee.com said. The virus tries to steal the account numbers and passwords of AOL users and, if successful, will e-mail them back to the author of the virus. This could give the hacker access to user's e-mail and other personal information. When a user logs on to the AOL service, the virus will also try to e-mail itself to all of the contacts listed in that member's Buddy List. That means users who are not AOL members can also receive the virus. Those non-AOL users are not at risk of having passwords stolen, but the virus will slow down the performance of any PC it infects, Goostree said. This ability of the virus to e-mail itself to other users occurs only with version 4.0 of AOL's software. Improvements to Versions 5.0 and 6.0 prevent the virus from replicating itself, although it can still steal passwords from users of those versions. In addition, when a user of AOL Version 6.0 is infected, the virus creates a pop-up message urging the user to switch back to Version 4.0 of the software, Goostree said. AOL 4.0 users constitute a "distinct minority" of members, with most using versions 5.0 or 6.0, said AOL spokesman Andrew Weinstein. The company played down the significance of the virus and said it hasn't felt the need to send a warning to its members via e-mail. "Obviously we can't speak for McAfee, but we haven't seen a significant increase in the number of people affected," Weinstein said. The virus is written in Visual Basic 5, and first appeared in a slightly different form in January of 2000. As with other viruses, hackers have since played with the virus code to create new strains, trying to stay one step ahead of antivirus programs that detect it. "As we've been tracking it over the past few months we have watched this thing increase in activity," Goostree said. "In the last 30 days we've watched it increase 100%, so we said, 'OK, we need to talk to AOL and get this thing wiped out.'" AOL responded well, she said, and the ISP has been pointing members to a McAfee.com Web site where users can cleanse their PCs for free. RELATED STORIES: Analysis: Understanding viruses RELATED IDG.net STORIES: Understanding viruses RELATED SITES: McAfee.com | ||||||||||||||||||||||||||||||||||||||||
|
Back to the top |
© 2003 Cable News Network LP, LLLP.
A Time Warner Company. All Rights Reserved. Terms under which this service is provided to you. Read our privacy guidelines. Contact us. |