This is a fact that every web related application – even the web itself- is prone to attacks from viruses, malwares, hackers etc. Since, internet phone systems or VoIP also use broadband internet to function, therefore, it is not less of a victim to unwanted sufferings caused by these intrusions.
A Trojan horse is a virus that easily lets hackers, as well as other also law enforcement organizations including FBI, CIA etc, to record VoIP calls. As far as it is VoIP calls call recoding by law enforcement in the U.S., this is most likely nothing illegal and even they are only authorized to act on this if they have a court order to inspect suspected criminals’ VoIP calls. However, as for viruses and other hackers, it is undeniably illegal to breach the VoIP barriers. This is most likely is selfish act to cause inflictions to others and steal their important details such as banking account details, residential address and personal numbers and other details. This is an ongoing trend witnessed to grow every passing day.
There are some computer viruses, which do not cause much harm nevertheless; they spy on other people’s activities – purely an act of eavesdropping. But, now this drift has become a lethal weapon which professional hackers and law enforcement agencies use against others – a virus which eavesdrops on voice conversations and other data, particularly internet phone calls.
This is basic feature of a new Trojan horse is that it has the ability to records VoIP calls through various VoIP phone services. VoIP calls are almost free or low costing and can take place either between computers or between PC and a normal phone.
There are about a billion internet phone users in the world but it is unlikely many would be hit by the new virus. If used to capture targeted surveillance from law enforcement agencies, one can easily comprehend the need, owing to the global terrorism acts spread across, but imagine if the same technology gets in the hands of these terrorists and other criminals, this would give rise to mass violence and privacy threats.
Trojan Horse, doesn’t specifically target VoIP calls, instead it attacks the operating system of a computer that is responsible for managing audio processing. That way, when one is making internet phone calls, the virus intercepts with all audio data coming from the recipient. These audio in turn is saved in form of MP3 files and then is sent over to the computers managed by hacker, criminals or law enforcement agencies, for that matter.
This virus was designed by Ruben Unteregger, a Swiss programmer who although started out as using it for himself but, later turned it into a project for his company, ERA IT Solutions.