Symantec Security Response: Backdoor.Bardor.A
Symantec Security Response: Backdoor.Bardor.A
Today, Symantec Security Response discovered the first Windows CE (Pocket PC) backdoor Trojan -- Backdoor.Bardor.A. Once installed, the backdoor allows full control of the handheld system when it is restarted.
When the infected handheld is connected to the Internet, the backdoor sends the attacker the IP address of the handheld device. It then opens port 44299 and waits for further instructions from the attacker.
The backdoor only affects ARM CPU based Pocket PC devices. ARM CPU's are high-speed processors that are widely used in PDAs and other handheld devices because of their small size and low power requirements.
At this time, Symantec is categorizing the threat as a Level 1 threat. Threat Levels range from 1 to 5, 5 being the most severe.
"Backdoor server and Trojan horse programs often use enticing file names to trick users into executing them," said Oliver Friedrichs, senior manager, Symantec Security Response. "Users should not open or execute files from unknown sources."
Symantec's security experts recommend that compromised systems be completely reinstalled because of the ability of the remote user to perform so many different actions on the server system, including installation of applications. Additionally, users should delete the file /Windows/StartUp/svchost.exe.
ENDS
Banking Ombudsman Scheme: Fraud Check Delays Well Worth The Inconvenience, Says Banking Ombudsman
Asia Pacific AML: NZ’s Financial Crime Gap - Beyond The 'Number 8 Wire' Mentality
Westpac New Zealand: Kiwi Households Adapting Despite Widespread Cost Pressure Concerns, Westpac Survey Shows
University of Auckland: Kids’ Screen Use Linked To Long-Term Deficits In Self-Control And Attention
University of Auckland: Research To Address Equity In STEM For Māori, Pacific And Female Students
Stats NZ: Economic Impacts On New Zealand From Conflict In The Middle East – Report

