Generally speaking, music Trojan attacks are mainly divided into two methods. One is to use music players to create music Trojans; the other is to place Trojans directly on the web pages of music websites. Among them, the second type is the most common.
In addition to MP3 music, the WMA format is also a very common music format on the Internet, but no one would have thought that there is a Trojan horse hidden in WMA music, right? WMA Trojans attack by popping up web pages. The attacker will directly insert the Trojan connection URL into the WMA music, so that the Trojan web page will pop up when the WMA music is played. When the user visits the attacker's music website, the music will be played normally on the webpage. On the surface, there is no abnormality. However, in fact, the webpage Trojan has been opened in the background. If you look closely, you will see a red hidden shell in the lower right corner of the browser. The report prompts and is displayed as "Unknown area mixed". Double-click to open the hidden report dialog box, and you can see that the Trojan web page has been accessed.
With so many murderous intentions hidden in music, how can ordinary netizens prevent the invasion of music Trojans? It's actually very simple.
1. Patches are very important
WMA Music Trojan uses vulnerabilities in the Windows system to attack. If there are no vulnerabilities in the system, WMA Music Trojan will naturally be powerless against us. Therefore, to prevent WMA music Trojans, the first step is to apply system security patches.
The WMA music Trojan is generated by exploiting the MS06-067 IE overflow vulnerability in the Windows system, so at least it must be patched with the MS06-067 vulnerability patch and the Windows security update (KB922760). You can download it from Microsoft official website or use the patch tool to patch it. After the patch is installed, restart the computer to prevent WMA music Trojan attacks.
2. Utilization of tools
In fact, most music Trojans and video Trojans attack by popping up Trojan web pages. Therefore, the essence of preventing music and video Trojan attacks is to guard against web Trojans. There are many ways to prevent web Trojans, and there are many things to pay attention to. It is recommended that you use anti-virus software or auxiliary tools that have anti-hanging and window blocking functions.
Finally, during the chat with Kingsoft Anti-Virus engineers and experts, I clearly understood that this type of virus is mainly spread through loopholes. Take the "Golden Armor" I watched before as an example. Bar. There are two reasons why I got the virus:
1. Because my media player has a vulnerability, and through this vulnerability, the virus attacked my computer;
2. When I opened the movie, several windows suddenly popped up (at that time, I suddenly felt a chill from my feet to my brain. I knew that I was probably infected by a virus). These windows were advertising windows. Generally speaking, we call them advertising windows. Rogue software. This rogue software is just to increase its page views and then improve its ranking to let more people know about its website. It is not harmful in itself. What's bad is that there are so many visitors to this website, and hackers are attracted to this website, and then they hang the website.
So after going through the above procedures. When we open a video or music with advertisements, while the advertisement pops up, the Trojan is downloaded to the machine and then quietly performs virus operations.