Here’s a new way to get Microsoft to pay attention to you: slip a brief message into the malicious Trojan horse program you just wrote.

That’s what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.

The message is surprisingly cordial, given that Microsoft’s security researchers spend their days trying to put people like Zlob’s author out of business. “Just want to say ‘Hello’ from Russia. You are really good guys. It was a surprise for me that Microsoft can respond on threats so fast,” the hacker wrote, adding, “Happy New Year, guys, and good luck!”

Zlob is one of the most common types of Trojan programs used to attack Windows these days. In a typical Zlob scam, the victim is sent a link to what looks like an interesting video. When the link is clicked, the user is told to install a multimedia codec file in order to watch the video. That file is actually malicious software.

It’s not clear whether the author of this message is the creator of Zlob, according to Joe Stewart, a researcher with SecureWorks. That’s because “Zlob is one of those things that gets mislabeled by AV companies a lot,” he said via email. “Basically any time they see malware being spread by ‘you need this video codec…’ messages in multimedia files, it gets the Zlob label.”

This isn’t the first time this particular hacker has sent a note to Microsoft’s security group. Last October he wrote a slightly creepy message, saying, “I want to see your eyes the man from Windows Defender’s team.”

Unlike the October message, this latest note wasn’t caught by Microsoft. It was found Friday by a French security researcher using the hacker handle S!Ri.

According to this latest message, it may be the Zlob hacker’s last note to Microsoft. “We are closing soon,” he wrote. “So, you will not see some of my great 😉 ideas in that family of software.”

Explore More

How to hack?

This is a tutorial I found on the net. This tutorial will explain to you how to hack someone’s internet account thru his router.This hack is based on a secuirty

[Tut/Sources] References to poly/meta/permutation

Articles: Polymorphic engines – Trigger – SLAM #4 Code: http://vx.netlux.org/lib/static/vdat/tupoleng.htm Polymorphism ant Intel instruction format – LiTlLe VxW – 29A #7 Code: http://vx.netlux.org/29a/29a-7/Articles/29A-7.027 Guide to improving Polymorphic Engines – Rogue

brb’s uninstaller 2009, Freeware

When brb’s Uninstaller is started, its main window fills with installed applications. Change View type From the uninstaller toolbar you can change the way that the list of applications may