Printer Friendly

Bitrix Alerts About Trojan Program Disguising as Microsoft Silverlight Update and Bitrix Security Framework.

Alexandria, VA, October 29, 2010 --( The Trojan installs a keylogger capable to capture keystrokes including username, password and credit card number.

Bitrix, Inc. (, a technology trendsetter in business communications solutions, alerts customers about the existence of a Trojan program pretending to be the Bitrix security framework. The Trojan is capable of stealing confidential data from infected computers and received the highest threat level from malware experts.

Identified as a part of the "Agent" malware family, the Trojan is presumably spread using mass mailing of spam and malicious links. The malware can be delivered to the target computer in different flavors including pretending to be a Microsoft Silverlight or Bitrix security update. If a user launches the infected file, the Trojan installs itself into the system by creating multiple files and registering itself in the system registry. After installation the malware unobtrusively runs in the background, captures keystrokes and sends out collected data to an external service. This way a malicious person can obtain the user's confidential information including username, password and credit card number.

The Trojan can be identified by the presence of "Bitrix Security" folder in the application data directory which contains a number of supplementary files and a run-time library under randomly generated names (for example xaukvmm60.dll).

Bitrix recommends that users update their virus scanners and check their computers against this malicious program.

Read more about how to protect your web assets against web-borne malware in a dedicated white paper "10 Ways to Keep Hackers in Check and Ensure Safe Web Resources" by Marcel Nizam, Head of Web Security Development at Bitrix, Inc.


Contact Information:

Bitrix, Inc.

Alex Reznor

+1 (703) 740-8301

Toll Free Number (U.S. and Canada only):

+1-888-5BITRIX (+1-888-524-8749)
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2010 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback (Press Releases)
Date:Oct 29, 2010
Previous Article:After Switching to AppAssure Replay, IT Pro Achieves Lightning-Fast Recovery.
Next Article:Social Knowledge Management: VEDALIS Launches a Solution for SMEs.

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters