Pinchs main danger is that it is very easy to use, so any malicious user with basic computer knowledge could create a Trojan in a very short time for very little money, explains Jeremy Matthews, CE of Panda Software SA.
One of Pinchs main features is that it allows attackers to specify the data that Trojans steal, Matthews adds. One of the interface tabs, PWD, allows malicious users to select the type of password to be stolen by the Trojan: from e-mail passwords to passwords kept by the system tools. Also, it is possible to order the Trojan to encrypt this data when sending it, so that nobody else can read it.
The SPY tab lets criminals turn Trojans into keyloggers that capture all keystrokes. Trojans can also be designed to take screenshots on the infected computer, steal browser data or look for certain files on the target system.
A feature called NET allows attackers to use Pinch to turn the infected computer into a proxy, so that it can be used to perform malicious or criminal activities on the Internet without leaving any trace. Trojans can also be turned into downloaders that download other executable files onto the compromised computer.
The BD tab allows crooks to specify the ports that the Trojan will open on the infected computer, thus giving backdoor features to Trojans. The ETC tab allows the Trojans to be hidden through techniques including rootkits.
One of the most dangerous features of Pinch can be exploited through the WORM tab, which allows criminals to add worm features to their creations, so that they can spread by their own means, infecting other files or sending themselves out by e-mail.
Pinch also lets users carry out other actions: turn infected computers into zombie computers, pack Trojans to make detection more difficult, and kill certain system processes, particularly those of security solutions.
Finally, Pinch lets users define the way in which stolen data must be sent to its creator. Cyber-crooks can receive data via SMTP, HTTP or, simply order the Trojan to leave stolen data in a file on the infected computer to retrieve it later on through a port opened by the Trojan itself.
Pinch is accompanied by a parser program that allows users to decrypt the reports created by the Trojan with the stolen data and perform searches in them, so that cyber-crooks can easily identify the most profitable data.
This is a very complete tool that allows attackers to create all kinds of Trojans, from the simplest to the most complex and dangerous ones capable of stealing all types of confidential data from infected users. Even worse, the tool can be bought over the Internet, so any malicious user could have access to it, concludes Matthews.
If you think your computer might have been infected by malicious code, scan it for free at www.infectedornot.com <http://www.infectedornot.com/>
|