{"id":384,"date":"2007-02-13T00:31:37","date_gmt":"2007-02-13T06:31:37","guid":{"rendered":"https:\/\/blog.mhvt.net\/?p=384"},"modified":"2008-07-11T11:22:26","modified_gmt":"2008-07-11T19:22:26","slug":"sophos-the-fujacks-worm-suspects-caught","status":"publish","type":"post","link":"https:\/\/blog.mhvt.net\/?p=384","title":{"rendered":"Sophos: The Fujacks Worm Suspects Caught"},"content":{"rendered":"<p><a href=\"mac\/anti-spam\/anti-spam.jpg\"><img decoding=\"async\" src=\"mac\/anti-spam\/anti-spam.jpg\" alt=\"anti spam\" \/><\/a><br \/>\n<br \/><\/br><br \/>\n<br \/><\/br><br \/>\nAccording to Internet security company Sophos, Chinese authorities have several suspects of hackers associated with the Fujacks worm in custody.  This virus started spreading some time around January 2006 among PC users.  If the computer is infected, icons will become a picture of panda.  It is designed to steal usernames and passwords.  According to Sophos, these suspects have earned more $12,000 selling malware to other hackers.<br \/>\n<br \/><\/br><br \/>\n<br \/><\/br><br \/>\nClick on the button to find out more. <a href=\"http:\/\/www.sophos.com\/pressoffice\/news\/articles\/2007\/02\/fujacks-arrest.html\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mhvt.net\/quicktime\/eng\/graphics\/button.gif\" width=\"25\" height=\"25\" alt=\"VTC\" \/><\/a><br \/>\nClick on the button to hear what victims of cybercriminals have to say. <a href=\"mac\/cybercriminals\/crowd.aiff\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mhvt.net\/quicktime\/eng\/graphics\/button.gif\" width=\"25\" height=\"25\" alt=\"VTC\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Internet security company Sophos, Chinese authorities have several suspects of hackers associated with the Fujacks worm in custody. This virus started spreading some time around January 2006 among PC users. If the computer is infected, icons will become &hellip; <a href=\"https:\/\/blog.mhvt.net\/?p=384\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":342,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-384","post","type-post","status-publish","format-standard","hentry","category-internet-security"],"_links":{"self":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/users\/342"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=384"}],"version-history":[{"count":0,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/384\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}