/?pid=3053

Updated:12:08 PM EDT Jun 06


this is ggmania.com subsite Custom Trojan Creation Tool Sold Online - TechAmok

Custom Trojan Creation Tool Sold Online - [security]
04:03 AM EDT - Jul,21 2007 - post a comment

PandaLabs has uncovered Pinch, a tool sold on several online forums and designed to create Trojans. The tool lets cyber-crooks define a series of malicious actions that the Trojans can take.
One of Pinch's main features is that it allows attackers to specify the data that Trojans steal. One of the interface tabs, PWD, allows malicious users to select the type of password to be stolen by the Trojan: from email passwords to passwords kept by the system tools. Also, it is possible to order the Trojan to encrypt this data when sending it, so that nobody else can read it.

The SPY tab lets criminals turn Trojans into keyloggers that capture all key strokes. Trojans can also be designed to take screenshots on the infected computer, steal browser data or look for certain files on the target system. A feature called NET allows attackers to use Pinch to turn the infected computer into a proxy, so that it can be used to perform malicious or criminal activities on the Internet without leaving any trace. Trojans can also be turned into downloaders that download other executable files onto the compromised computer.

The BD tab allows crooks to specify the ports that the Trojan will open on the infected computer, thus giving backdoor features to Trojans. The ETC tab allows the Trojans to be hidden through techniques including rootkits. One of the most dangerous features of Pinch can be exploited through the WORM tab, which allows criminals to add worm features to their creations, so that they can spread by their own means, infecting other files or sending themselves out by email.

Pinch also lets users carry out other actions: turn infected computers into zombie computers, pack Trojans to make detection more difficult, and kill certain system processes, particularly those of security solutions. Finally, Pinch lets users define the way in which stolen data must be sent to its creator. Cyber-crooks can receive data via SMTP, HTTP or, simply order the Trojan to leave stolen data in a file on the infected computer to retrieve it later on through a port opened by the Trojan itself.


Add your comment (free registrationrequired)

Short overview of recent news articles

Jun,06 2025 Predator: Killer of Killers - Exclusive Clip (2025)
Jun,06 2025 Enable Deep Effect on Samsung One Ui 7
Jun,05 2025 Google Kills Off PayPal in Google Wallet
Jun,05 2025 Samsung's Next Flagship Foldable Will be Ultra
Jun,05 2025 Over 40 Malicious Chrome Extensions Mimic Popular Brands to Steal
Jun,03 2025 The Witcher IV - Unreal Engine 5 tech demo
Jun,02 2025 Nintendo Switch 2 Welcome Tour trailer
Jun,01 2025 Stranger Things 5 | Date Announcement | Netflix
May,31 2025 RTX 5060 Review... No wonder NVIDIA tried to stop us from talking
May,30 2025 Samsung Galaxy Watch 8 Classic Is Here - 7 New Updates
May,30 2025 Biggest Windows 11 24H2 May Update in the Main Release
May,29 2025 How Much Money Should You Spend on a Gaming PC?
May,29 2025 laud Note vs Note Pin - Which AI Voice Recorder To Choose
May,29 2025 Samsung One UI 8.0 vs One UI 7.0 - 25+ Changes
May,28 2025 SECRET CODE UPDATE for Samsung Galaxy Phone to Boost Performance &
May,27 2025 WhatsApp is finally available on iPad
May,27 2025 Simple Trick To Lower CPU Temperatures
May,26 2025 Alma & The Wolf - Official Trailer (2025) Ethan Embry, Li Jun Li,
May,25 2025 Change These Browser Security Settings NOW
May,24 2025 I NEED AMD to Seize This Moment - RX 9060XT
May,23 2025 Windows 98 with a G41 Core 2 Duo System
May,23 2025 Disable These Windows Settings for Better FPS!
May,20 2025 I Got the Golden GPU from Dubai
May,19 2025 Windows 10 emergency update KB5061768 fixes BitLocker boot loops -
May,19 2025 2025 AUDI S5 AVANT // 0-100 100-200 TOP SPEED POV & SOUND
May,18 2025 Jurassic World Rebirth - Official 'Alert' Teaser Trailer (2025)
May,18 2025 F1 25 and F1 The Movie hand in hand
May,17 2025 Everyone is Cooling Their PC Wrong
May,16 2025 M5 KILLER? Testing the MERCEDES E63S AMG!
May,16 2025 Samsung Fully Reveals 5.8mm-Thick Galaxy S25 Edge
May,16 2025 Apple Intros New Accessibility Apps, Plus Accessibility "Labels"
May,16 2025 Americana - Official Trailer (2025) Sydney Sweeney, Halsey, Simon
May,16 2025 Aston Martin x Apple CarPlay Ultra - Next generation of automotive
May,15 2025 Google TAG deleted 23,000+ YouTube channels in January, February,
May,14 2025 NVIDIA GeForce Game Ready 576.40 WHQL Driver Released
May,13 2025 F1 - Official Trailer #2 (2025) Brad Pitt, Damson Idris, Kerry
May,11 2025 The Old Guard 2 - Official Trailer (2025) Charlize Theron, KiKi
May,11 2025 I think I know why Ryzen 9000 Series CPUs are Dying...(!)
May,10 2025 Is Windows Defender good enough in 2025?
May,09 2025 AMD Adrenalin 25.5.1 Driver Released for Doom: The Dark Ages
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs