?
Solved

EvilVNC Beta

Posted on 2006-11-06
5
Medium Priority
?
629 Views
Last Modified: 2013-11-15
I recently received a hit during a scan on my system for EvilVNC.  It appears that there is very little information available on this RAT.  I keep my systems locked down pretty tight and have all security software updating religiously.  Does anyone have any idea how it is distributing itself?  I do use UltraVNC, but I have its scope limited to local network.  Any ideas?

Thanks.
0
Comment
Question by:Hawk5471
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 27

Accepted Solution

by:
David-Howard earned 200 total points
ID: 17885584
This software states that it detects and removes EvilVNC.
http://labs.paretologic.com/spyware.aspx?remove=EvilVNC%20beta
:-)
David
0
 

Author Comment

by:Hawk5471
ID: 17885647
I guess I should have mentioned that Xoftspy was the software I used to find it and remove it.  I'm just trying to find out where it came from and what is the weak link on my system that allowed it to get there in the first place so that I can be sure to fix it!  Thanks for the quick reply.

Al
0
 
LVL 27

Expert Comment

by:David-Howard
ID: 17885967
Oh...That's going to be very hard to track down. As you know it could have gained system entry from just about any site. Chat programs are even under attack now. :-)
David
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
Check out the latest tech news, community articles, and expert highlights in August's newsletter.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question