Welcome to the Virus Encyclopedia of Panda Security.
|Effects: ||It joins an IRC channel in order to receive control commands, such as launching denial of service attacks against websites.|
|First detected on:||June 16, 2005|
|Detection updated on:||June 16, 2005|
Sdbot.EAK is a backdoor that belongs to the Sdbot family. Backdoors belonging to this family have the following common characteristics:
- They allow hackers to gain remote access to the affected computer in order to carry out actions that compromise user confidentiality and impede the tasks performed.
- They use their own IRC client in order to join an IRC channel and accept remote control commands, such as launching denial of service (DoS) attacks against websites. They can also download and run files on the affected computer.
Backdoors belonging to the Sdbot family do not spread automatically using its own means. They need an attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, e-mail messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.
Sdbot.EAK is difficult to recognize, as it does not display any messages or warnings that indicate it has reached a computer.