Skip to main content

QAZ

There have been many papers discussing the major aspects of the QAZ companion virus, and a compilation of several of these papers indicates that there may yet be surprises. We are dealing with a selective, stealthy infectious agent in that the spreading process is limited. When introduced into on a single LAN without effective AV protection, QAZ can remain for a long time undetected. With QAZ, anything can be uploaded and run. An infected PC can, using uploaded tools, attack anything. When caught in a trace or in a log, the owner is the owner of the infected PC and not the attacker. Usually the attack tools will be found on the QAZ infected PC only during use. They will not be there when someone knocks on the door

47 (PDF, 1.63MB)

6 Aug 2001
ByCharles Fagg
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.

QAZ