Use of Malware in Espionage

Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to explo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Medical Imaging and Information Sciences 2010, Vol.27(4), pp.102-104
1. Verfasser: HONJO, Shinsuke
Format: Artikel
Sprache:eng ; jpn
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 104
container_issue 4
container_start_page 102
container_title Medical Imaging and Information Sciences
container_volume 27
creator HONJO, Shinsuke
description Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage.
doi_str_mv 10.11318/mii.27.102
format Article
fullrecord <record><control><sourceid>proquest_jstag</sourceid><recordid>TN_cdi_proquest_journals_1477204208</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3180564631</sourcerecordid><originalsourceid>FETCH-LOGICAL-j1163-b55521848e15563f4a0d8799f8d1f29006e6a6dbc79621fbe7101dfd846e2bd73</originalsourceid><addsrcrecordid>eNo9UE1LxDAUDKJgWffk0UvBc-t7aT5PIsv6ASte3HNI20SzdNuadBH_vYWKl5nDDDPvDSHXCCViheruGEJJZYlAz0iGSkHBtJTnJAONUCBn1SVZpxRqAFASNVcZudknlw8-f7Xdt40uD32-TWMYevvhrsiFt11y6z9ekf3j9n3zXOzenl42D7vigCiqouacU1RMOeRcVJ5ZaJXU2qsWPdUAwgkr2rqRWlD0tZMI2PpWMeFo3cpqRW6X3DEOXyeXJnMYTrGfKw0yKSkwCmp23S-uQ5rm48wYw9HGH2PjFJrOmfl7Q6VhC8wj_CvNp43G9dUvE2xTWQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1477204208</pqid></control><display><type>article</type><title>Use of Malware in Espionage</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>HONJO, Shinsuke</creator><creatorcontrib>HONJO, Shinsuke</creatorcontrib><description>Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage.</description><identifier>ISSN: 0910-1543</identifier><identifier>EISSN: 1880-4977</identifier><identifier>DOI: 10.11318/mii.27.102</identifier><language>eng ; jpn</language><publisher>Gifu: MEDICAL IMAGING AND INFORMATION SCIENCES</publisher><subject>Computer Virus ; Exploit ; Malware ; Targeted Attacks</subject><ispartof>Medical Imaging and Information Sciences, 2010, Vol.27(4), pp.102-104</ispartof><rights>2010 by Japan Society of Medical Imaging and Information Sciences</rights><rights>Copyright Japan Science and Technology Agency 2010</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,778,782,27911,27912</link.rule.ids></links><search><creatorcontrib>HONJO, Shinsuke</creatorcontrib><title>Use of Malware in Espionage</title><title>Medical Imaging and Information Sciences</title><addtitle>Medical Imaging and Information Sciences</addtitle><description>Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage.</description><subject>Computer Virus</subject><subject>Exploit</subject><subject>Malware</subject><subject>Targeted Attacks</subject><issn>0910-1543</issn><issn>1880-4977</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><recordid>eNo9UE1LxDAUDKJgWffk0UvBc-t7aT5PIsv6ASte3HNI20SzdNuadBH_vYWKl5nDDDPvDSHXCCViheruGEJJZYlAz0iGSkHBtJTnJAONUCBn1SVZpxRqAFASNVcZudknlw8-f7Xdt40uD32-TWMYevvhrsiFt11y6z9ekf3j9n3zXOzenl42D7vigCiqouacU1RMOeRcVJ5ZaJXU2qsWPdUAwgkr2rqRWlD0tZMI2PpWMeFo3cpqRW6X3DEOXyeXJnMYTrGfKw0yKSkwCmp23S-uQ5rm48wYw9HGH2PjFJrOmfl7Q6VhC8wj_CvNp43G9dUvE2xTWQ</recordid><startdate>20100101</startdate><enddate>20100101</enddate><creator>HONJO, Shinsuke</creator><general>MEDICAL IMAGING AND INFORMATION SCIENCES</general><general>Japan Science and Technology Agency</general><scope>7QO</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>P64</scope></search><sort><creationdate>20100101</creationdate><title>Use of Malware in Espionage</title><author>HONJO, Shinsuke</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j1163-b55521848e15563f4a0d8799f8d1f29006e6a6dbc79621fbe7101dfd846e2bd73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng ; jpn</language><creationdate>2010</creationdate><topic>Computer Virus</topic><topic>Exploit</topic><topic>Malware</topic><topic>Targeted Attacks</topic><toplevel>online_resources</toplevel><creatorcontrib>HONJO, Shinsuke</creatorcontrib><collection>Biotechnology Research Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><jtitle>Medical Imaging and Information Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>HONJO, Shinsuke</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Use of Malware in Espionage</atitle><jtitle>Medical Imaging and Information Sciences</jtitle><addtitle>Medical Imaging and Information Sciences</addtitle><date>2010-01-01</date><risdate>2010</risdate><volume>27</volume><issue>4</issue><spage>102</spage><epage>104</epage><pages>102-104</pages><issn>0910-1543</issn><eissn>1880-4977</eissn><abstract>Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage.</abstract><cop>Gifu</cop><pub>MEDICAL IMAGING AND INFORMATION SCIENCES</pub><doi>10.11318/mii.27.102</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0910-1543
ispartof Medical Imaging and Information Sciences, 2010, Vol.27(4), pp.102-104
issn 0910-1543
1880-4977
language eng ; jpn
recordid cdi_proquest_journals_1477204208
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Computer Virus
Exploit
Malware
Targeted Attacks
title Use of Malware in Espionage
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T04%3A38%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_jstag&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Use%20of%20Malware%20in%20Espionage&rft.jtitle=Medical%20Imaging%20and%20Information%20Sciences&rft.au=HONJO,%20Shinsuke&rft.date=2010-01-01&rft.volume=27&rft.issue=4&rft.spage=102&rft.epage=104&rft.pages=102-104&rft.issn=0910-1543&rft.eissn=1880-4977&rft_id=info:doi/10.11318/mii.27.102&rft_dat=%3Cproquest_jstag%3E3180564631%3C/proquest_jstag%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1477204208&rft_id=info:pmid/&rfr_iscdi=true