<s>
Sub7	B-Protocol
,	O
or	O
SubSeven	B-Protocol
or	O
Sub7Server	B-Protocol
,	O
is	O
a	O
Trojan	O
horse	O
program	O
originally	O
released	O
in	O
1999	O
.	O
</s>
<s>
Its	O
name	O
was	O
derived	O
by	O
spelling	O
NetBus	B-Protocol
backwards	O
(	O
"	O
suBteN	O
"	O
)	O
and	O
swapping	O
"	O
ten	O
"	O
with	O
"	O
seven	O
"	O
.	O
</s>
<s>
As	O
of	O
June	O
2021	O
,	O
the	O
development	O
of	O
Sub7	B-Protocol
is	O
being	O
continued	O
.	O
</s>
<s>
Because	O
its	O
typical	O
use	O
is	O
to	O
allow	O
undetected	O
and	O
unauthorized	O
access	O
,	O
Sub7	B-Protocol
is	O
usually	O
described	O
as	O
a	O
trojan	O
horse	O
by	O
security	O
experts	O
.	O
</s>
<s>
Starting	O
with	O
version	O
2.1	O
(	O
1999	O
)	O
it	O
could	O
be	O
controlled	O
via	O
IRC	B-Protocol
.	O
</s>
<s>
As	O
one	O
security	O
book	O
phrased	O
it	O
:	O
"	O
This	O
set	O
the	O
stage	O
for	O
all	O
malicious	O
botnets	B-Architecture
to	O
come.	O
"	O
</s>
<s>
Additionally	O
Sub7	B-Protocol
has	O
some	O
features	O
deemed	O
of	O
little	O
use	O
in	O
legitimate	O
remote	O
administration	O
like	O
keystroke	O
logging	O
.	O
</s>
<s>
Sub7	B-Protocol
worked	O
on	O
the	O
Windows	O
9x	O
and	O
on	O
the	O
Windows	B-Device
NT	I-Device
family	I-Device
of	O
operating	O
systems	O
,	O
up	O
to	O
and	O
including	O
Windows	B-Device
8.1	I-Device
.	O
</s>
<s>
Sub7	B-Protocol
has	O
been	O
claimed	O
to	O
be	O
the	O
creation	O
of	O
a	O
hacker	O
with	O
the	O
handle	O
"	O
mobman	O
"	O
.	O
</s>
<s>
In	O
2006	O
(	O
sub7legends.net	O
)	O
re-opened	O
with	O
hundreds	O
of	O
thousands	O
of	O
users	O
,	O
and	O
has	O
kept	O
Sub7	B-Protocol
alive	O
with	O
clean	O
downloads	O
and	O
support	O
and	O
new	O
software	O
releases	O
.	O
</s>
<s>
SubSeven	B-Protocol
2.3	O
,	O
released	O
on	O
March	O
9	O
,	O
2010	O
,	O
was	O
revamped	O
to	O
work	O
on	O
all	O
32-bit	O
and	O
64-bit	O
versions	O
of	O
Windows	O
and	O
includes	O
TCP	O
Tunnel	O
and	O
Password	O
Recovery	O
for	O
browsers	O
,	O
instant	O
messengers	O
and	O
email	O
clients	O
.	O
</s>
<s>
It	O
was	O
very	O
buggy	O
and	O
was	O
not	O
written	O
in	O
Delphi	B-Language
which	O
the	O
original	O
author	O
used	O
.	O
</s>
<s>
Like	O
other	O
remote	O
admin	O
programs	O
,	O
Sub7	B-Protocol
is	O
distributed	O
with	O
a	O
server	B-Application
and	O
a	O
client	B-Protocol
.	O
</s>
<s>
The	O
server	B-Application
is	O
the	O
program	O
that	O
the	O
host	O
must	O
run	O
in	O
order	O
to	O
have	O
their	O
machines	O
controlled	O
remotely	O
,	O
and	O
the	O
client	B-Protocol
is	O
the	O
program	O
with	O
a	O
GUI	B-Application
that	O
the	O
user	O
runs	O
on	O
their	O
own	O
machine	O
to	O
control	O
the	O
server/host	O
PC	O
.	O
</s>
<s>
Computer	O
security	O
expert	O
Steve	O
Gibson	O
once	O
said	O
that	O
with	O
these	O
features	O
,	O
Sub7	B-Protocol
allows	O
a	O
hacker	O
to	O
take	O
"	O
virtually	O
complete	O
control	O
"	O
over	O
a	O
computer	O
.	O
</s>
<s>
Sub7	B-Protocol
is	O
so	O
invasive	O
,	O
he	O
said	O
,	O
that	O
anyone	O
with	O
it	O
on	O
their	O
computer	O
"	O
might	O
as	O
well	O
have	O
the	O
hacker	O
standing	O
right	O
next	O
to	O
them	O
"	O
while	O
using	O
their	O
computer	O
.	O
</s>
<s>
Sub7	B-Protocol
has	O
more	O
features	O
than	O
Netbus	B-Protocol
(	O
webcam	O
capture	O
,	O
multiple	O
port	O
redirect	O
,	O
user-friendly	O
registry	O
editor	O
,	O
chat	O
and	O
more	O
)	O
,	O
but	O
it	O
always	O
tries	O
to	O
install	O
itself	O
into	O
windows	O
directory	O
and	O
it	O
does	O
not	O
have	O
activity	O
logging	O
.	O
</s>
<s>
According	O
to	O
a	O
security	O
analysis	O
,	O
Sub7	B-Protocol
's	O
server-side	O
(	O
target	O
computer	O
)	O
features	O
include	O
:	O
</s>
<s>
taking	O
over	O
an	O
ICQ	B-Protocol
account	O
used	O
on	O
the	O
target	O
machine	O
(	O
back	O
then	O
the	O
most	O
popular	O
messaging	O
service	O
)	O
;	O
added	O
in	O
version	O
2.1	O
.	O
</s>
<s>
On	O
the	O
client-side	O
the	O
software	O
had	O
an	O
"	O
address	O
book	O
"	O
that	O
allowed	O
the	O
controller	O
to	O
know	O
when	O
the	O
target	O
computers	O
are	O
online	O
.	O
</s>
<s>
Additionally	O
the	O
server	B-Application
program	O
could	O
be	O
customized	O
before	O
being	O
delivered	O
by	O
a	O
so-called	O
server	B-Application
editor	O
(	O
an	O
idea	O
borrowed	O
from	O
Back	B-Protocol
Orifice	I-Protocol
2000	I-Protocol
)	O
.	O
</s>
<s>
Customizations	O
possible	O
with	O
the	O
Sub7	B-Protocol
server	B-Application
editor	O
included	O
changing	O
the	O
port	O
addresses	O
,	O
displaying	O
a	O
customized	O
message	O
upon	O
installation	O
that	O
could	O
be	O
used	O
for	O
example	O
"	O
to	O
deceive	O
the	O
victim	O
and	O
mask	O
the	O
true	O
intent	O
of	O
the	O
program	O
"	O
.	O
</s>
<s>
The	O
Sub7	B-Protocol
server	B-Application
could	O
also	O
be	O
configured	O
to	O
notify	O
the	O
controller	O
of	O
IP	B-Protocol
address	I-Protocol
changes	O
of	O
the	O
host	O
machine	O
by	O
email	O
,	O
ICQ	B-Protocol
or	O
IRC	B-Protocol
.	O
</s>
<s>
Connections	O
to	O
Sub7	B-Protocol
servers	O
can	O
be	O
password	O
protected	O
with	O
a	O
chosen	O
password	O
.	O
</s>
<s>
A	O
deeper	O
reverse	O
engineering	O
analysis	O
revealed	O
however	O
that	O
"	O
SubSeven	B-Protocol
's	O
author	O
has	O
secretly	O
included	O
a	O
hardcoded	O
master	O
password	O
for	O
all	O
of	O
his	O
Trojans	O
!	O
</s>
<s>
The	O
Master	O
Password	O
for	O
SubSeven	B-Protocol
DEFCON8	O
2.1	O
Backdoor	O
is	O
acidphreak	O
.	O
</s>
<s>
SubSeven	B-Protocol
has	O
been	O
used	O
to	O
gain	O
unauthorized	O
access	O
to	O
computers	O
.	O
</s>
<s>
In	O
2003	O
,	O
a	O
hacker	O
began	O
distributing	O
a	O
Spanish-language	O
email	O
purporting	O
to	O
be	O
from	O
security	O
firm	O
Symantec	O
that	O
was	O
used	O
to	O
trick	O
recipients	O
into	O
downloading	O
Sub7	B-Protocol
.	O
</s>
<s>
Although	O
Sub7	B-Protocol
is	O
not	O
itself	O
a	O
worm	O
(	O
has	O
no	O
built-in	O
self-propagation	O
features	O
)	O
it	O
has	O
been	O
leveraged	O
by	O
some	O
worms	O
such	O
as	O
W32/Leaves	B-Protocol
(	O
2001	O
)	O
.	O
</s>
<s>
Some	O
versions	O
of	O
Sub7	B-Protocol
include	O
code	O
from	O
Hard	O
Drive	O
Killer	O
Pro	O
to	O
format	O
the	O
hard	O
drive	O
,	O
this	O
code	O
will	O
only	O
run	O
if	O
it	O
matched	O
the	O
ICQ	B-Protocol
number	O
of	O
"	O
7889118	O
"	O
(	O
mobman	O
's	O
rival	O
trojan	O
author	O
.	O
)	O
</s>
