How does the recently discovered OddJob Trojan differ from previous banking Trojans, such as Zeus? Are there particular...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
technological protections we can put in place to prevent infection?
The most nefarious new feature the OddJob Trojan brings onto the malware landscape is that it keeps Web browser sessions open after users think they have logged out of targeted websites. There are few technical details, but Symantec Corp. does have a write-up in which it outlines the technical details and also specifies best practices users should follow to protect themselves.
When it comes to online security, banking Trojan OddJob differs from the Zeus banking Trojan minimally in its end goal of stealing money from victims, but some of the technical details do differ. The two greatest differences between OddJob and Zeus are the maturity of Zeus and the real-time nature of OddJob. Zeus has been around for a long time compared to the average lifespan of a malware family, and OddJob has just emerged in the last few months. Zeus also has mature functionality for building and managing the malware that is extended as new attacks are developed. OddJob differs from Zeus by operating in real-time, allowing the attacker to continue to use a Web browser session from an infected client to steal money, rather than stealing credentials for later use, as Zeus does. The protections in both cases are the same basic best practices since the most important step is to prevent OddJob (or Zeus) from first getting installed on a system in the first place.
Dig Deeper on Malware, Viruses, Trojans and Spyware
Related Q&A from Nick Lewis
Researchers warned about the rise of a new cross-site scripting flaw involving same-origin policy. Expert Nick Lewis explains the vulnerability and ...continue reading
Malware authors are adopting software wrapping to hide malicious code and avoid detection. Expert Nick Lewis explains how to defend against the ...continue reading
Malicious software using legitimate digital certificates is reportedly on the rise. Expert Nick Lewis explains how to mitigate the risks of digitally...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.