Use security software
Many new forms of attack have emerged in the past, but the most dangerous is software
Many new forms of attack have emerged in the past, but the most dangerous is the "extortion" software and the virus spread through the "wicked" antivirus application.
In the latest report published on May 16, Finjan's Malware Research Center affirmed that " rogue antispyware " is one of two emerging threats at the most dizzying speed today. The remaining trend is that hackers seek to steal sensitive business data and demand "ransom".
In addition, the rootkit virus continues to be one of the toughest and most difficult obstacles for IT administrators, Finjan said.
Source: NewsFactor
Dangerous goods "ridiculous"
Imitating a model that appeared a few years ago, the rogue spyware removal software was born and proliferated rapidly, thanks to drilling into the user's weak point of psychological fear of spyware.
In this form of attack, hackers disguise their malware with a great cover: free anti-spyware application and heavily advertised online. Once the user downloads them, the application will automatically download malicious code or "open the door" of the computer to wait for "accomplices" to attack.
In some cases, the tool even ran a fake spyware scanner. They will notify the user to detect some spyware residing in the machine, then direct users to a website. There, users are urged to buy a "perfect" version of the wacky tool.
" The bad guys have taken advantage of spyware users' vigilance. There are many underground networks on the web, where this type of code is sold freely to anyone who wants to buy. I don't know who is willing to spend. The money to buy them, but obviously they are full on the Internet, "a Finjan expert commented.
The fact that hackers can create the same antispyware tools is a proof that the spyware industry has grown to an extremely sophisticated, professional and highly qualified level.
Abduction extortion
Another sign of this claim is the increasing frequency of "extortion" attacks, or ransomware. In it, an attacker using ransomware captured some important files on the computer and sent an ultimatum to the user, that would permanently lock the file if they refused to pay for them.
Often ransomware scans the hard drive of an infected computer, searches for a set of pre-installed keywords to search for documents containing important personal or financial data.
Finjan's report presented a recent incident, when hackers used a spyware called CryZip to block the infected computer with a password and demanded a $ 300 ransom. They leave a message on the phone that explains to the victim what happened and warned them not to tell the police. The victim will receive a password to access the blocked files after they receive the ransom.
Another version of ransomware installs annoying annoying messages on the computer. Every time they start up, they will show up, asking users to pay if they want hackers to delete them from the computer.
" With professional technology people, ransomware can be easily removed. But for ordinary users, especially at home or small businesses, this is really a headache ," said Ben-Itzhak analyst. identify.
" If in the old days, hackers wanted to turn off your computer, then now, cyber criminals want computers to always work, connect to the Web so they can extort money ."
Thien Y
- Detecting ghost PC management software
- McAfee security products make mistakes ... security
- Security software extends its reach
- Microsoft released Security Essentials software
- Novell updated security management software
- Trend Micro launches new 'smartphone' security software
- Code that destroys new hacker disguise security
- Oracle suddenly revealed a security error
- Microsoft announced e-mail security software
- Security software is about to turn into the main target of hackers
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system