Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Trojan serves porn off home PCs, not many dead

AOLers chief victims


A new Trojan is turning Windows PCs into porn and spam relays, possibly as a means of harvesting credit card details, researcher Richard M. Smith has discovered.

At first it was suspected that the Trojan installs a Web server on the victim's machine from which the porn is served, but research by LURHQ indicates that it sets up a proxy which forwards the porn and x-rated spam and so keeps the originating server hidden.

Machines hosting the Trojan are not harmed in any way, but spam recipients who check out the porn on offer may become victims of fraud if they sign up for access using their credit cards.

The overall purpose appears to be establishing a semi-anonymous, distributed hosting scheme for malicious sites or for material that might invite retaliation from a Web host or the authorities, such as warez or child porn.

Only about two thousand home machines have been infected, but among them is a high proportion of AOL subscribers, implying that it may be spread via instant messaging. According to LURHQ it is easy to detect and defeat.

First, remove this registry key:

Software\Microsoft\Windows\CurrentVersion\Run\Login Service = wingate.exe

Then reboot the computer and remove this file:

%windir%\system32\wingate.exe.

The spam ads direct users to Russian porn sites chiefly, sometimes using servers that were involved in a recent Paypal scam, Smith notes. ®

Related Stories

Rise of the Spam Zombies
Trojan defence clears man of child porn charges
What's the difference between a viral attack and a scan?
Windows Root kits a stealthy threat
Mindjail worms way through IRC
Fizzer stealth worm spreads via KaZaA


Other stories you might like

  • Outlook bombards Safari users with endless downloads
    Mystery zero-byte file deluge makes site unusable, hundreds of netizens complain

    Attention, Mac users who access Outlook with Safari: something's broken, and it's causing an empty TokenFactoryIFrame file to be downloaded every few seconds for as long as you remain there.

    Microsoft hasn't said what's causing the problem, though it did acknowledge the ongoing blunder in this support message-board thread on Microsoft Answers. We understand this flood of downloads affects Safari on desktop Macs; it may also affect browsers on iOS using Safari's WebKit engine, such as Microsoft Edge on iPads.

    The Redmond giant noted in a post dated May 3, "We have recently received several reports that customers have the issue when they visit Outlook in a Safari browser on Mac it keeps downloading token factory iframe. We are doing research on our side to see if we can find any relevant information about the issue." Microsoft has not responded to questions from The Register.

    Continue reading
  • Cisco says its AI crystal ball can predict network errors
    Now all we need is a model to predict where and when and how this will be used

    Wish your network could predict its own problems and fix them automatically? Cisco believes it has the technology you need.

    The networking tech giant announced today what it said is the culmination of two years of work: an analytics engine that can predict network issues before they happen, and with enough integration and training even fix problems itself, Cisco said

    Citing data from an in-house study, Cisco said that 45 percent of IT leaders it surveyed cited responding to disruptions as their biggest networking challenge of 2021. Predictive analytics technology, coupled with "enormous amounts of historical [networking] data," is a potential solution, Cisco said.

    Continue reading
  • Qualcomm sampling Wi-Fi 7 silicon for next-gen access points
    OEMs able to develop new products with aim of 10Gbps-plus throughput

    Qualcomm is sampling its Wi-Fi 7 Networking Pro Series chips aimed at throughput of more than 10Gbps for enterprise access points, gateways, and premium home routers.

    The third generation of the chipmaker's Networking Pro Series platforms is set to "initiate a new era" of 10Gbps Wi-Fi, Qualcomm claimed, stating that the new portfolio is optimized for multi-user environments and low CPU utilization to power collaboration, telepresence, and metaverse applications for both home and enterprise environments.

    Sampling means that the Networking Pro silicon is available to Qualcomm's OEM customers so they can develop and test the Wi-Fi 7 products that will ship to end users at some point. It isn't clear when buyers will actually be able to get their hands on kit to deploy, although Qualcomm previously said it expects to see Wi-Fi 7 products hit the market in 2023.

    Continue reading

Biting the hand that feeds IT © 1998–2022