How QB is not stolen. !

by sauiniu3 on 2012-02-14 17:21:36

First, let me introduce the general types of trojans currently found online. There are email-stealing QQ password trojans and ASP-based online message-receiving trojan programs designed to steal accounts. These two types of account-stealing trojans represent almost all features of trojans circulating on the internet today. The reason why these trojans can reach your computer is because you yourself have downloaded small programs like cheats from minor forums or opened emails with attachments sent by unknown people. These things usually come bundled with trojans. Once you download and run them, you’ve effectively planted a trojan on your system!

Second: Let’s discuss the characteristics after a trojan has been installed. One prominent feature is that when you log into QQ, the small golden lock icon next to the password input box will be replaced by a white cross. This indicates that your password encryption system has been compromised by the trojan. If you see this, it's a 100% confirmation that your system is infected. Even if you change your password, the attacker will still know it. Newer trojans are even more advanced:

1. They use advanced process injection techniques, making the QQ theft program undetectable without any process or registry startup items. It also includes file self-protection and COM+ hook protection features, making it difficult to detect, remove, or kill.

2. These trojans use API-HOOK technology to completely bypass the keyboard protection mechanisms in QQ versions ranging from QQ2005 to QQ2006b1. This ensures that no red "X" warning appears, including for special versions like Coral Bug, Flying Cloud, Black Guest, Anti-Theft editions, and other modified QQ clients.

3. They possess powerful password interception capabilities, ensuring complete capture of both password data and QQ numbers. These trojans can intercept passwords from all current QQ versions, virtually eliminating the possibility of missed or unintercepted data.

4. Two methods of sending stolen information are provided:

[1] Traditional SMTP mail sending to avoid losing data.

[2] ASP-based sending, allowing direct updates of stolen data to your website via an ASP address.

5. Customizable icons: You can set your own icon for the generated trojan program.

6. Additional features:

[1] Filtering duplicate numbers. Mail is only sent if the username and password differ from the last login attempt, thus avoiding redundant number issues.

This type of trojan operates stealthily and cannot be easily detected!

**Recommendation:** Do not casually download cheats or small utilities from forums; always download from official websites. If after downloading something, QQ automatically closes within a minute or shows as logged in elsewhere, immediately change your password but do not log back into QQ with the new one. Quickly reinstall your system since antivirus software typically cannot detect QQ trojans due to the lack of corresponding virus signatures in most antivirus databases.

Another precaution is to use split-input when entering your password. For example, if your password is "123456," first type "1236," then move your mouse cursor between the "3" and "6" and insert "45." This way, the password transmitted by the trojan would be "123645," which is incorrect. This is a trick to confuse the trojan!

Please remember this carefully!!!

Lastly, set a daily spending limit for your QQ account at pay.qq.com. Limit the maximum daily expenditure to 1 QQ Coin and each transaction to 1 QQ Coin. By setting this spending limit, even if your QQ account is hacked, the thief won't be able to steal your QQ Coins — they can only change your password!