{"id":2340,"date":"2004-06-25T00:00:00","date_gmt":"2004-06-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/06\/25\/new-virus-may-steal-data\/"},"modified":"2021-12-30T11:41:06","modified_gmt":"2021-12-30T11:41:06","slug":"new-virus-may-steal-data","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/06\/25\/new-virus-may-steal-data\/","title":{"rendered":"New Virus May Steal Data"},"content":{"rendered":"<p>A mysterious Internet virus being spread Friday by hundreds and possibly thousands of infected websites may be aimed at stealing credit card and other valuable information, security experts warned.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The infection appears to take advantage of three separate flaws with Microsoft products.<\/p>\n<p>Microsoft said software updates to fix two of them had been released in April, but the third flaw was newly discovered and had no patch to fix it yet.<\/p>\n<p>Car Bomb in Hilla Kills 17 Iraqis -U.S.<\/p>\n<p>Experts said the infection, detected by Microsoft on Thursday, was unusually broad but wasn&#8217;t substantially interfering with Internet traffic.<\/p>\n<p>Security technicians at Microsoft and elsewhere worked Friday to pin down how the infection spreads across websites.<\/p>\n<p>It appears to target at least one recent version of Internet Information Server, Microsoft&#8217;s software for operating websites.<\/p>\n<p>The infection makes subtle changes to the site so visitors get a piece of code that&#8217;s designed to retrieve from a Russian website software that records a person&#8217;s keystrokes and can send data back, experts say.<\/p>\n<p>Such software &#8220;Trojan horses&#8221; are routinely used to fish for credit card numbers, bank accounts, passwords and the like.<\/p>\n<p>&#8220;Users should be aware that any website, even those that may be trusted by the user, may be affected by this activity and thus contain potentially malicious code,&#8221; the U.S. Computer Emergency Readiness Team warned in an Internet alert.<\/p>\n<p>Stephen Toulouse, a security program manager at Microsoft, recommended that computer owners obtain the latest security updates for Microsoft products and their antivirus and firewall programs.<\/p>\n<p>Because one flaw has yet to be fixed, he said, users should also turn up security settings on Microsoft&#8217;s Internet Explorer browsers to the highest levels.<\/p>\n<p>http:\/\/www.wired.com\/news\/infostructure\/0,1377,63994,00.html?tw=newsletter_topstories_html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2340","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2340"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2340\/revisions"}],"predecessor-version":[{"id":4827,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2340\/revisions\/4827"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}