Acidus wrote: {snip} ] Imagine a virus that exploits a box, searchs for specific ] data, send it to you, patch the hole the came in with, and ] moves to the next computer. Or, rather than patching the hole, remains dormant waiting for a new search string ... or, better yet, don't patch, but leave a flag indicating what search strings have been searched for on what dates, then remove itself (avoids re-infection and minimizes run time and bandwith use == less likely to catch attention from AV firms) The problem then becomes where to distribute the harvested info to and from the distribution center unnoticed. |