The 5 most 'dirty' tricks of malware

If cyber criminals stand behind viruses, Trojans and destructive software

If the cyber criminals are behind a little more "silly" virus, Trojan and destructive software, we don't have to worry that much.

Only thing, when the security community has taken a "step" in preventing attacks, they immediately deal with the level of sophistication . 10 times.

Here are 5 of the hacker's most dirty tricks in invading your computer, all based on Trojans.

1. "Don't bother me"

Once hacked into the computer, it will try to disable the security barrier before downloading the actual malware. This malware can steal data or do whatever the hacker wants.

2. Website is locked and encrypted?

Picture 1 of The 5 most 'dirty' tricks of malware
Source: Infoworld No problem. Websites can (and should) use SSL to encrypt and protect sensitive data such as bank account login information. (When the padlock icon appears in the address bar, this indicates that the site is using SSL).

However, Gozi Trojan takes advantage of SSL to fool Windows, making Windows think that it is part of the encryption process.

As a result, your data leaves IE, goes through Gozi and is then encrypted and sent to the World Wide Web. Instead of "scouting" for content typed into the keyboard (an activity that will surely be very secure by security software), Gozi Trojan lurks into the operating system as a fake SSL service provider.

3. Specialized malware . kills other malware

Always run a virus scan software that is recommended by experts, yes. But SpamThru Trojan turned that "good thing" into a nightmare. This dirty malware faked a pirated version of Kaspersky Antivirus for users to download.

Then, every time it is activated, it will detect and eliminate other malware to turn the victim PC into "own". From here, SpamThru will freely distribute spam without fear of losing a computer to any opponent.

In case users install other anti-virus software, SpamThru will try to prevent this software from updating new information. Consequently, it will not be identified and detected.

4. Create admin rights yourself

Encrypting sensitive data and then protecting it with a password will help prevent spy eyes. But what happens when "SpyAgent Trojan" also applies this encryption to cover the user's eyes?

When installed on a Windows computer with the File Encryption system (available in Windows 2000, XP Pro, 2003 Server and 2005 Media Center, SpyAgent will set it up for a user account with equivalent admin access). , then use this account to encrypt your files.

You - and your antivirus software - will have to sit guessing what the account's password is if you want to scan the file and delete it from the device.

5. Faking Windows Update to fool the firewall

Firewalls have the function of protecting computers and networks against hacker in-and-out efforts. Therefore, "Jowspry Trojan" disguised as something-know-what-is-there: Windows Update.

This misguided malware mimics its connectivity features exactly like the Windows Intelligent Background Transfer Service uses, so "silly" firewalls will allow it to download more malicious programs.

If you are activating the Windows Update feature, absolutely avoid opening attachments or clicking on links within spam. Use a good anti-virus software if you don't want the opportunity to spread malware.

Trong Cam

Update 13 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment