In light of the interest in the recently discovered Linux based Remote Shell Trojan, vnunet.com has uncovered more details of the worm's functionality in a bid to dispel any fear, uncertainty and doubt. Security experts analysing the Trojan have said that . . .
In light of the interest in the recently discovered Linux based Remote Shell Trojan, vnunet.com has uncovered more details of the worm's functionality in a bid to dispel any fear, uncertainty and doubt. Security experts analysing the Trojan have said that it infects Linux Executable and Linking Format (ELF) files, initially surfacing in the /bin directory.

It should be noted, however, that infected ELF files will remain fully functional so as to hide the infection. The program displays some virus-like qualities such as self-replication via email. It also installs a backdoor in the infected host, listening on UDP port 5503 or higher.

The link for this article located at vnunet is no longer available.