New Media Trojan Exploits Bad Old Piracy, P2P HabitsNew Media Trojan Exploits Bad Old Piracy, P2P Habits
A particularly aggressive new Trojan takes advantage of the oldest of vulnerabilities -- human nature. Hiding in pirate software sites, the Trojan infects the music and video files of illegal software seekers, then spreads when those files are peer-shared.

A particularly aggressive new Trojan takes advantage of the oldest of vulnerabilities -- human nature. Hiding in pirate software sites, the Trojan infects the music and video files of illegal software seekers, then spreads when those files are peer-shared.According to Secure Computing, the Trojan embeds in multimedia files including MP3 and WMV.
When one of those files is played, a pop-up prompts the user to download a codec -- do so, and there comes the malware.
Once the malware arrives, the infected media files are able to further its spread via peer-to-peer file-sharing.
The source of the infection, according to Secure Computing, appears to be warez pirate software and software-key sites, which makes its subsequent spread vector a pretty safe badguy bet: users grabbing illegal warez are pretty likely to be P2Ping illegal (or, for that matter, legit, the malware doesn't care) content as well.
Like I said: human nature.
But coming on the heels of the P2P peek behind Justice Breyer's privacy robes, this is yet another reminder that small and midsize businesses need to get the word out to all their employees that piracy and, I recommend, P2P are absolutely prohibited on company equipment, networks and time.
About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025