Use of Malware in Espionage
Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to explo...
Gespeichert in:
Veröffentlicht in: | Medical Imaging and Information Sciences 2010, Vol.27(4), pp.102-104 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng ; jpn |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 104 |
---|---|
container_issue | 4 |
container_start_page | 102 |
container_title | Medical Imaging and Information Sciences |
container_volume | 27 |
creator | HONJO, Shinsuke |
description | Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage. |
doi_str_mv | 10.11318/mii.27.102 |
format | Article |
fullrecord | <record><control><sourceid>proquest_jstag</sourceid><recordid>TN_cdi_proquest_journals_1477204208</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3180564631</sourcerecordid><originalsourceid>FETCH-LOGICAL-j1163-b55521848e15563f4a0d8799f8d1f29006e6a6dbc79621fbe7101dfd846e2bd73</originalsourceid><addsrcrecordid>eNo9UE1LxDAUDKJgWffk0UvBc-t7aT5PIsv6ASte3HNI20SzdNuadBH_vYWKl5nDDDPvDSHXCCViheruGEJJZYlAz0iGSkHBtJTnJAONUCBn1SVZpxRqAFASNVcZudknlw8-f7Xdt40uD32-TWMYevvhrsiFt11y6z9ekf3j9n3zXOzenl42D7vigCiqouacU1RMOeRcVJ5ZaJXU2qsWPdUAwgkr2rqRWlD0tZMI2PpWMeFo3cpqRW6X3DEOXyeXJnMYTrGfKw0yKSkwCmp23S-uQ5rm48wYw9HGH2PjFJrOmfl7Q6VhC8wj_CvNp43G9dUvE2xTWQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1477204208</pqid></control><display><type>article</type><title>Use of Malware in Espionage</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>HONJO, Shinsuke</creator><creatorcontrib>HONJO, Shinsuke</creatorcontrib><description>Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage.</description><identifier>ISSN: 0910-1543</identifier><identifier>EISSN: 1880-4977</identifier><identifier>DOI: 10.11318/mii.27.102</identifier><language>eng ; jpn</language><publisher>Gifu: MEDICAL IMAGING AND INFORMATION SCIENCES</publisher><subject>Computer Virus ; Exploit ; Malware ; Targeted Attacks</subject><ispartof>Medical Imaging and Information Sciences, 2010, Vol.27(4), pp.102-104</ispartof><rights>2010 by Japan Society of Medical Imaging and Information Sciences</rights><rights>Copyright Japan Science and Technology Agency 2010</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,778,782,27911,27912</link.rule.ids></links><search><creatorcontrib>HONJO, Shinsuke</creatorcontrib><title>Use of Malware in Espionage</title><title>Medical Imaging and Information Sciences</title><addtitle>Medical Imaging and Information Sciences</addtitle><description>Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage.</description><subject>Computer Virus</subject><subject>Exploit</subject><subject>Malware</subject><subject>Targeted Attacks</subject><issn>0910-1543</issn><issn>1880-4977</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><recordid>eNo9UE1LxDAUDKJgWffk0UvBc-t7aT5PIsv6ASte3HNI20SzdNuadBH_vYWKl5nDDDPvDSHXCCViheruGEJJZYlAz0iGSkHBtJTnJAONUCBn1SVZpxRqAFASNVcZudknlw8-f7Xdt40uD32-TWMYevvhrsiFt11y6z9ekf3j9n3zXOzenl42D7vigCiqouacU1RMOeRcVJ5ZaJXU2qsWPdUAwgkr2rqRWlD0tZMI2PpWMeFo3cpqRW6X3DEOXyeXJnMYTrGfKw0yKSkwCmp23S-uQ5rm48wYw9HGH2PjFJrOmfl7Q6VhC8wj_CvNp43G9dUvE2xTWQ</recordid><startdate>20100101</startdate><enddate>20100101</enddate><creator>HONJO, Shinsuke</creator><general>MEDICAL IMAGING AND INFORMATION SCIENCES</general><general>Japan Science and Technology Agency</general><scope>7QO</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>P64</scope></search><sort><creationdate>20100101</creationdate><title>Use of Malware in Espionage</title><author>HONJO, Shinsuke</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j1163-b55521848e15563f4a0d8799f8d1f29006e6a6dbc79621fbe7101dfd846e2bd73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng ; jpn</language><creationdate>2010</creationdate><topic>Computer Virus</topic><topic>Exploit</topic><topic>Malware</topic><topic>Targeted Attacks</topic><toplevel>online_resources</toplevel><creatorcontrib>HONJO, Shinsuke</creatorcontrib><collection>Biotechnology Research Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><jtitle>Medical Imaging and Information Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>HONJO, Shinsuke</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Use of Malware in Espionage</atitle><jtitle>Medical Imaging and Information Sciences</jtitle><addtitle>Medical Imaging and Information Sciences</addtitle><date>2010-01-01</date><risdate>2010</risdate><volume>27</volume><issue>4</issue><spage>102</spage><epage>104</epage><pages>102-104</pages><issn>0910-1543</issn><eissn>1880-4977</eissn><abstract>Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage.</abstract><cop>Gifu</cop><pub>MEDICAL IMAGING AND INFORMATION SCIENCES</pub><doi>10.11318/mii.27.102</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0910-1543 |
ispartof | Medical Imaging and Information Sciences, 2010, Vol.27(4), pp.102-104 |
issn | 0910-1543 1880-4977 |
language | eng ; jpn |
recordid | cdi_proquest_journals_1477204208 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Computer Virus Exploit Malware Targeted Attacks |
title | Use of Malware in Espionage |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T04%3A38%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_jstag&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Use%20of%20Malware%20in%20Espionage&rft.jtitle=Medical%20Imaging%20and%20Information%20Sciences&rft.au=HONJO,%20Shinsuke&rft.date=2010-01-01&rft.volume=27&rft.issue=4&rft.spage=102&rft.epage=104&rft.pages=102-104&rft.issn=0910-1543&rft.eissn=1880-4977&rft_id=info:doi/10.11318/mii.27.102&rft_dat=%3Cproquest_jstag%3E3180564631%3C/proquest_jstag%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1477204208&rft_id=info:pmid/&rfr_iscdi=true |