The 5 most 'dirty' tricks of malware
If cyber criminals stand behind viruses, Trojans and destructive software
If the cyber criminals are behind a little more "silly" virus, Trojan and destructive software, we don't have to worry that much.
Only thing, when the security community has taken a "step" in preventing attacks, they immediately deal with the level of sophistication . 10 times.
Here are 5 of the hacker's most dirty tricks in invading your computer, all based on Trojans.
1. "Don't bother me"
Once hacked into the computer, it will try to disable the security barrier before downloading the actual malware. This malware can steal data or do whatever the hacker wants.
2. Website is locked and encrypted?
Source: Infoworld No problem. Websites can (and should) use SSL to encrypt and protect sensitive data such as bank account login information. (When the padlock icon appears in the address bar, this indicates that the site is using SSL).
However, Gozi Trojan takes advantage of SSL to fool Windows, making Windows think that it is part of the encryption process.
As a result, your data leaves IE, goes through Gozi and is then encrypted and sent to the World Wide Web. Instead of "scouting" for content typed into the keyboard (an activity that will surely be very secure by security software), Gozi Trojan lurks into the operating system as a fake SSL service provider.
3. Specialized malware . kills other malware
Always run a virus scan software that is recommended by experts, yes. But SpamThru Trojan turned that "good thing" into a nightmare. This dirty malware faked a pirated version of Kaspersky Antivirus for users to download.
Then, every time it is activated, it will detect and eliminate other malware to turn the victim PC into "own". From here, SpamThru will freely distribute spam without fear of losing a computer to any opponent.
In case users install other anti-virus software, SpamThru will try to prevent this software from updating new information. Consequently, it will not be identified and detected.
4. Create admin rights yourself
Encrypting sensitive data and then protecting it with a password will help prevent spy eyes. But what happens when "SpyAgent Trojan" also applies this encryption to cover the user's eyes?
When installed on a Windows computer with the File Encryption system (available in Windows 2000, XP Pro, 2003 Server and 2005 Media Center, SpyAgent will set it up for a user account with equivalent admin access). , then use this account to encrypt your files.
You - and your antivirus software - will have to sit guessing what the account's password is if you want to scan the file and delete it from the device.
5. Faking Windows Update to fool the firewall
Firewalls have the function of protecting computers and networks against hacker in-and-out efforts. Therefore, "Jowspry Trojan" disguised as something-know-what-is-there: Windows Update.
This misguided malware mimics its connectivity features exactly like the Windows Intelligent Background Transfer Service uses, so "silly" firewalls will allow it to download more malicious programs.
If you are activating the Windows Update feature, absolutely avoid opening attachments or clicking on links within spam. Use a good anti-virus software if you don't want the opportunity to spread malware.
Trong Cam
- EMCO Malware Destroyer -
- Sneaking malware on the Internet
- The biggest security threats in 2007
- The greatest tricks in history or the media game of the media?
- The terrible consequences of magic tricks are prevalent throughout netizens
- The magic tricks of the virtual match control turned out to be the physical lesson learned at school
- Revealing a series of tricks from magicians that we have long ago believed
- Malware will not be detected
- Extremely toxic scientific tricks with fluid that amaze you
- Detecting malware on Android specializes in stealing 'virtual money'
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system