I've written up an analysis of the Win32.Grams trojan. It differs from previous E-Gold phishing trojans in that it doesn't steal credentials; it uses the victim's own browser to siphon all the E-Gold (well, almost all, it leaves them .004 grams) directly from their account to another E-Gold account, using OLE automation. This would completely bypass all the new authentication methods financial institutions are using to thwart keystroke loggers/password stealers, because the trojan simply lets the user do the authentication, then takes over from there.
Full analysis is here: http://www.lurhq.com/grams.html -Joe -- Joe Stewart, GCIH Senior Security Researcher LURHQ http://www.lurhq.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html