Talk With an Expert

QAZ

QAZ (PDF, 1.63MB)Published: 06 Aug, 2001
Created by:
Charles Fagg

There have been many papers discussing the major aspects of the QAZ companion virus, and a compilation of several of these papers indicates that there may yet be surprises. We are dealing with a selective, stealthy infectious agent in that the spreading process is limited. When introduced into on a single LAN without effective AV protection, QAZ can remain for a long time undetected. With QAZ, anything can be uploaded and run. An infected PC can, using uploaded tools, attack anything. When caught in a trace or in a log, the owner is the owner of the infected PC and not the attacker. Usually the attack tools will be found on the QAZ infected PC only during use. They will not be there when someone knocks on the door