Symantec: Phel Trojan horse attacks on Windows XP
It can affect systems, even if the latest XP service pack has been installed
Computerworld - Security firm Symantec Corp. is warning users of a newly discovered Trojan horse named Phel -- an anagram of the word help -- that attacks Windows XP. The Trojan is capable of remotely controlling a user's system even if the latest Windows XP Service Pack, SP2, has been installed.
The Trojan horse, distributed as an HTML file, attempts to exploit a vulnerability in Internet Explorer's HTML Help Control component in all versions of Windows. The vulnerability was discovered in October.
Microsoft is actively investigating new public reports of a criminal attack, according to a Microsoft spokesperson.
For the exploit to succeed, an attacker would need to entice a user to visit a malicious Web site and then would have to place the Trojan horse on the user's machine. If the Trojan executes successfully, potentially malicious software could be downloaded and run on the user's system, the spokesperson said.
Microsoft is working to forensically analyze the malicious code in Phel and will work with law enforcement agencies to identify and bring to justice those responsible for the malicious activity, he said.
"Microsoft is taking this vulnerability very seriously, and an update to correct the vulnerability is currently in development," the spokesperson said in an e-mail message. "We will release the security update when the development and testing process is complete, and the update is found to effectively correct the vulnerability."
Microsoft said customers in North America who think they may have been affected can receive help with security update issues or viruses at no charge by calling Product Support Services at 866-727-2338. International customers can receive the same level of support online at http://support.microsoft.com.
Customers in the U.S. who believe they have been attacked should contact their local FBI office or post their complaint online at www.ifccfbi.gov. Customers outside the U.S. should contact the national law enforcement agency in their country, the spokesperson said.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Market Overview: Digital Customer Experience Delivery Platforms Forrester states that businesses today struggle to understand and use the tools necessary to create and manage unified, multichannel digital customer experiences across...
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel...
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Malware and Vulnerabilities White Papers | Webcasts