Phishing Trojan plays ping-pong with captured data
,----[ Quote ]
| After infecting a victim's computer, the Trojan is programmed to
| install itself as an Internet Explorer Browser Helper Object (BHO).
| The software then waits for a victim to post sensitive data online.
| This data, once entered, is captured by the Trojan and sent to attackers.