taken from source !
Trojan Horse Technology Exploits IE
A new technology could let a Trojan horse disguise itself as Internet Explorer and let hackers steal data from your PC by fooling firewalls into thinking it's a trusted Microsoft application. The program launches an invisible window in Internet Explorer to connect stealthily to a Web server through an anonymous proxy site.
The Trojan horse exploits a standard feature in Internet Explorer that lets invisible browser windows open and connect to the Internet. The browser windows open in the background and don't appear on the desktop, so you can't see what they're doing. If you look for evidence of an open window in your Windows Task Manager, the window will be listed as IEXPLORE.EXE, just like a regular Internet Explorer window.
Internet Explorer uses invisible windows for many legitimate purposes, such as sending registration info to the Net. The e-mail program Eudora makes use of invisible browser windows to download pictures in e-mail.
The only way to block this trojan is to configure a firewall (such as
Zone Alarm) to deny access to the Anonymizer site.
Read more here:
h**p://www.pcworld.com/news/article/0,aid,103620,00.asp
atb
jake
