Script Kiddies: Vermin Of The Internet? - Trojans In Action (Page 3 of 6 )
Over the years, I have witnessed a great number of strange things occur on computers. Some incidences are simply PEBCAK problems (Problem Exists Between Chair and Keyboard - user error), hardware failure or, for want of a better term, "system brainfarts" - no identifiable cause.
But other occurrences are more sinister.
I remember one client reporting that her teenage daughter had been in an online chat room that night when suddenly the computer's CD-ROM tray began opening and closing of its own volition.
In the address bar of Internet Explorer a message was slowly typed out.
It read, "You are dead!"
You can imagine the effect that this experience had on the 14-year-old girl in question. This incident was more than likely a Script Kiddie attack, utilising a Trojan that was installed on the computer.
So how did this Trojan end up on the system? It was brought home from school on a disk, hidden in a program. This may have been deliberate as the school in question had a number of Script Kiddies in attendance. I became used to hearing their names mentioned.
Schools, along with the Internet, government departments and the workplace, are incredible sources of Trojan infestations. The kids constantly swap programs, and in their rush to install them will fail to scan properly. If your virus scanner is configured to be running all the time, this isn't such a problem. But for people with low-powered systems, 24/7 virus scanning really slows their computer down.
When out on the Internet, kids also have a tendency to reveal a great deal of information about themselves. The Internet is not a playground or a baby-sitter. It is a tool, akin to a chainsaw. Like a chainsaw, it can benefit or destroy.
And that brings me to the next point. Script Kiddies tend to be teenagers, still living at home. Unfortunately, there are also a number of "adults" who engage in the practice (that's all the more reason to label them "Script Kiddies"...immature and unthinking).
It's been my experience through my business that the family computer tends to be a breeding ground for all kinds of software. I have heard the startled comment, "how did that get on there?" many, many times when attending to ailing systems.
Not only might there be Trojans lurking on your system (this is easily fixed with the use of a good virus scanner), there may be the other end of the spectrum - the software that is used to illegally access other machines. These programs are not illegal; network administrators find them of great value in troubleshooting their systems. A number of these tools are free and easily accessible.
Do you know what software is installed on your computer?
I was going to publish some of the names of these programs, but thought twice as the information may actually prompt the birth of yet another "Script Kiddie" If you would like a list of some of the popular programs utilised to carry out this practice, please email me. I am currently compiling a list of these programs along with instructions on how to detect them. I can guarantee you that you probably won't find them under the Start/Programs menu!