Poison Ivy can take over your computer
The malware named PoisonIvy.r comes into computers through various online utilities, dubious software programs and movie downloads from infected websites. MicroWorld experts inform that a few cases of the presence of this Trojan have been reported from unprotected computer users in UK and Netherlands.
The Trojan uses a Server component of Poison Ivy, a commonly used Remote Administration Utility. Once inside the computer the malware copies itself into the Windows Root Directory and launches that copy for execution.
PoisonIvy.r gives remote attacker complete access of the compromised computer. Using the Backdoor through TCP channels, an attacker can harvest system information, stop and start processes, take screenshots of the desktop, download files from the net and do much more. The first variant of this Trojan was reported last year, which propagated using documents created in Japanese Text Editor program Ichitaro.
“The shout-out Virus is now a thing of the past,” says Govind Rammurthy, CEO of MicroWorld Technologies. “The in-thing today is a group of stealthier varieties with increasingly furtive nature and modes of infection. And that’s got a lot to do with the radical shift in the motives of today’s malware author as well. She means business and aims to use your computer for either sneaking into organizational networks or to launch all sorts of nefarious activities online”.