Solved

EvilVNC Beta

Posted on 2006-11-06
5
624 Views
Last Modified: 2013-11-15
I recently received a hit during a scan on my system for EvilVNC.  It appears that there is very little information available on this RAT.  I keep my systems locked down pretty tight and have all security software updating religiously.  Does anyone have any idea how it is distributing itself?  I do use UltraVNC, but I have its scope limited to local network.  Any ideas?

Thanks.
0
Comment
Question by:Hawk5471
  • 2
5 Comments
 
LVL 27

Accepted Solution

by:
David-Howard earned 50 total points
ID: 17885584
This software states that it detects and removes EvilVNC.
http://labs.paretologic.com/spyware.aspx?remove=EvilVNC%20beta
:-)
David
0
 

Author Comment

by:Hawk5471
ID: 17885647
I guess I should have mentioned that Xoftspy was the software I used to find it and remove it.  I'm just trying to find out where it came from and what is the weak link on my system that allowed it to get there in the first place so that I can be sure to fix it!  Thanks for the quick reply.

Al
0
 
LVL 27

Expert Comment

by:David-Howard
ID: 17885967
Oh...That's going to be very hard to track down. As you know it could have gained system entry from just about any site. Chat programs are even under attack now. :-)
David
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Android Touch & Google API 7 36
How to get latest vulnerabilities advisories by email. 3 73
What is the goal of SOC2 compliance? 4 30
Best way to encrypt a xls file 8 24
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Viewers will learn how to use the Hootsuite Dashboard.
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question