Phishing Trojan plays ping-pong with captured data
,----[ Quote ]
| After infecting a victim's computer, the Trojan is programmed to
| install itself as an Internet Explorer Browser Helper Object (BHO).
| The software then waits for a victim to post sensitive data online.
| This data, once entered, is captured by the Trojan and sent to attackers.
`----
http://www.theregister.co.uk/2006/08/08/phishing_trojan/
|
|