<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Trojan on Omid Farhang</title><link>https://omid.dev/tags/trojan/</link><description>Recent content in Trojan on Omid Farhang</description><generator>Hugo -- 0.152.2</generator><language>en-US</language><copyright>2025 Omid Farhang | All rights reserved.</copyright><lastBuildDate>Thu, 26 Jul 2012 14:18:00 +0000</lastBuildDate><atom:link href="https://omid.dev/tags/trojan/index.xml" rel="self" type="application/rss+xml"/><item><title>Trojan &amp;quot;made in Germany&amp;quot; spies in Bahrain</title><link>https://omid.dev/2012/07/26/trojan-made-in-germany-spies-in-bahrain/</link><pubDate>Thu, 26 Jul 2012 14:18:00 +0000</pubDate><guid>https://omid.dev/2012/07/26/trojan-made-in-germany-spies-in-bahrain/</guid><description>&lt;p&gt;h-Online: Citizenlab has released a &lt;a href="https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/3/"&gt;detailed analysis&lt;/a&gt; of the activities of a trojan in which the experts conclude that the malware is most likely closely related to FinFisher, a commercial spyware tool developed by a company called Gamma International. The trojan targeted political activists in Bahrain and included sender names such as that of an Al Jazeera correspondent and subject lines like “Torture reports on Rabil Najaab”.&lt;/p&gt;
&lt;p&gt;The attached .exe file, disguised as an image, disabled anti-virus software and installed a complete set of spyware programs on the recipient&amp;rsquo;s PC. The spyware proceeded to monitor, among other things, the victim&amp;rsquo;s Skype communications including conversations and file transfers. An analysis of the infected systems&amp;rsquo; working memory repeatedly produced the “finspy” character string. This name is used by Gamma to &lt;a href="http://www.youtube.com/watch?v=qc8i7C659FU"&gt;advertise FinFisher modules&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Madi Malware: Another Trojan Targets Organizations from the Middle East [Updated]</title><link>https://omid.dev/2012/07/18/madi-malware-another-trojan-targets-organizations-from-the-middle-east-updated/</link><pubDate>Wed, 18 Jul 2012 10:06:00 +0000</pubDate><guid>https://omid.dev/2012/07/18/madi-malware-another-trojan-targets-organizations-from-the-middle-east-updated/</guid><description>&lt;p&gt;This article is copied from &lt;a href="http://news.softpedia.com/news/Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-281808.shtml?utm_medium=twitter&amp;#038;utm_source=twitterfeed" target="_blank"&gt;Softpedia&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Researchers from&lt;/strong&gt; &lt;a href="http://www.symantec.com/connect/blogs/madi-attacks-series-social-engineering-campaigns"&gt;Symantec&lt;/a&gt;&lt;strong&gt;,&lt;/strong&gt; &lt;a href="https://www.securelist.com/en/blog/208193677/The_Madi_Campaign_Part_I"&gt;Kaspersky&lt;/a&gt; &lt;strong&gt;and&lt;/strong&gt; &lt;a href="http://blog.seculert.com/2012/07/mahdi-cyberwar-savior.html"&gt;Seculert&lt;/a&gt; **have all come across Madi (Madhi), a relatively new piece of malware that mainly targets organizations from the Middle East.&lt;br&gt;
**&lt;br&gt;
&lt;a href="http://lh4.ggpht.com/-4MNSYkERUms/UAaDk4ySqZI/AAAAAAAAGe8/ef_WdaAE8Ng/s1600-h/Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-2%25255B4%25255D.png" target="_blank"&gt;&lt;img title="Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-2" border="0" alt="Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-2" align="right" src="http://lh4.ggpht.com/-CBbuAJoWo-Q/UAaDpOmJ6YI/AAAAAAAAGfE/iKLgaN1G70Y/Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-2_thumb%25255B2%25255D.png?imgmax=800" width="244" height="189" /&gt;&lt;/a&gt;Before we take a look at Madi and compare it to other infamous Trojans such as Stuxnet, Duqu, or Flame, let’s take a quick look at its name.&lt;/p&gt;
&lt;p&gt;According to Wikipedia, &lt;a href="http://en.wikipedia.org/wiki/Mahdi"&gt;Mahdi&lt;/a&gt; is considered to be the redeemer of Islam who will rid the world of tyranny, injustice and wrongdoings.&lt;/p&gt;</description></item><item><title>MSUpdate Trojan attacked companies in the defense sector</title><link>https://omid.dev/2012/02/03/msupdate-trojan-attacked-companies-in-the-defense-sector/</link><pubDate>Fri, 03 Feb 2012 14:11:00 +0000</pubDate><guid>https://omid.dev/2012/02/03/msupdate-trojan-attacked-companies-in-the-defense-sector/</guid><description>&lt;p&gt;&lt;strong&gt;&lt;a href="http://lh6.ggpht.com/-Fs3dVEQ-l8Y/TyvjLvSM_GI/AAAAAAAAEdg/RNQKL1AtxLk/s1600-h/ISSNIP-2cc2f9030a6a50342.png"&gt;&lt;img title="ISSNIP-2cc2f9030a6a5034" border="0" alt="ISSNIP-2cc2f9030a6a5034" align="right" src="http://lh6.ggpht.com/-9qBDYBZmsdA/Tyvj61rvRJI/AAAAAAAAEdo/Q27nI3-TZeU/ISSNIP-2cc2f9030a6a5034_thumb.png?imgmax=800" width="175" height="244" /&gt;&lt;/a&gt;The H-Security:&lt;/strong&gt; Unknown attackers have tried to use an invitation to a prestigious conference to inject a Trojan into companies in the defense sector. The security firms &lt;a href="http://blog.seculert.com/2012/01/msupdater-trojan-and-conference-invite.html"&gt;Seculert and Zscaler&lt;/a&gt; report that opening an attached PDF flyer caused recipients&amp;rsquo; computers to be infected with spyware via a previously undisclosed hole in Acrobat Reader.&lt;/p&gt;
&lt;p&gt;According to the report, the attack mainly targeted government-related organizations, including military and aerospace contractors, in Europe and in the US. The security firms said that the attacks started back in 2009 and peaked in autumn 2010. Talking to The H&amp;rsquo;s associates at heise Security, Seculert CTO Aviv Raff added that compromised computers, some of which had been infected for two years, were only discovered a few weeks ago.&lt;/p&gt;</description></item><item><title>Fake Firefox update includes password-stealing trojan</title><link>https://omid.dev/2011/08/09/fake-firefox-update-includes-password-stealing-trojan/</link><pubDate>Tue, 09 Aug 2011 19:33:00 +0000</pubDate><guid>https://omid.dev/2011/08/09/fake-firefox-update-includes-password-stealing-trojan/</guid><description>&lt;p&gt;&lt;a href="http://4.bp.blogspot.com/-H8XZp2OkbU4/TkGC_grS9mI/AAAAAAAAD8c/hGBZjQ5PlSs/s1600/logo-wordmark-vertical.png"&gt;&lt;img loading="lazy" src="http://4.bp.blogspot.com/-H8XZp2OkbU4/TkGC_grS9mI/AAAAAAAAD8c/hGBZjQ5PlSs/s200/logo-wordmark-vertical.png" alt="" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;H-Online:&lt;/strong&gt; Security specialist Sophos &lt;a href="http://nakedsecurity.sophos.com/2011/08/08/fake-firefox-update-email-malware/"&gt;reports&lt;/a&gt; that it has discovered new spam email messages that claim to be an advisory related to an update to the open source Firefox web browser. The fake advisory asks users to update their Firefox installations, “for security reasons”, and includes a download link to the supposed update.&lt;/p&gt;
&lt;p&gt;According to Graham Cluley of Sophos, the download leads to an executable file that bundles an installer for the Windows version of &lt;a href="http://www.h-online.com/news/item/Firefox-5-0-1-brings-fixes-on-Mac-OS-X-Update-1277753.html"&gt;Firefox 5.0.1&lt;/a&gt; and a password-stealing trojan (&lt;a href="http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~PWS-BSF/detailed-analysis.aspx"&gt;Troj/PWS-BSF&lt;/a&gt;). As noted by Cluley, users should always exercise caution when clicking on links in emails.&lt;/p&gt;</description></item></channel></rss>