- Jul 16, 2001
- 17,976
- 141
- 106
Text
The man is alleged to have created a Trojan horse program distributed through peer-to-peer file sharing networks, like Kazaa. The Trojan horse can be hidden in a file for a picture or song and, once downloaded, gives the hacker remote access to the victim's computer.
Police characterized the Trojan horse as "highly sophisticated" and said they believe it has already infected thousands of computers in several countries. As far as they know, no commercial antivirus products are able to detect it, they said.
The man is alleged to have created a Trojan horse program distributed through peer-to-peer file sharing networks, like Kazaa. The Trojan horse can be hidden in a file for a picture or song and, once downloaded, gives the hacker remote access to the victim's computer.
Police characterized the Trojan horse as "highly sophisticated" and said they believe it has already infected thousands of computers in several countries. As far as they know, no commercial antivirus products are able to detect it, they said.
