Use security software

Many new forms of attack have emerged in the past, but the most dangerous is software

Many new forms of attack have emerged in the past, but the most dangerous is the "extortion" software and the virus spread through the "wicked" antivirus application.

In the latest report published on May 16, Finjan's Malware Research Center affirmed that " rogue antispyware " is one of two emerging threats at the most dizzying speed today. The remaining trend is that hackers seek to steal sensitive business data and demand "ransom".

In addition, the rootkit virus continues to be one of the toughest and most difficult obstacles for IT administrators, Finjan said.

Picture 1 of Use security software
Source: NewsFactor

Dangerous goods "ridiculous"

Imitating a model that appeared a few years ago, the rogue spyware removal software was born and proliferated rapidly, thanks to drilling into the user's weak point of psychological fear of spyware.

In this form of attack, hackers disguise their malware with a great cover: free anti-spyware application and heavily advertised online. Once the user downloads them, the application will automatically download malicious code or "open the door" of the computer to wait for "accomplices" to attack.

In some cases, the tool even ran a fake spyware scanner. They will notify the user to detect some spyware residing in the machine, then direct users to a website. There, users are urged to buy a "perfect" version of the wacky tool.

" The bad guys have taken advantage of spyware users' vigilance. There are many underground networks on the web, where this type of code is sold freely to anyone who wants to buy. I don't know who is willing to spend. The money to buy them, but obviously they are full on the Internet, "a Finjan expert commented.

The fact that hackers can create the same antispyware tools is a proof that the spyware industry has grown to an extremely sophisticated, professional and highly qualified level.

Abduction extortion

Another sign of this claim is the increasing frequency of "extortion" attacks, or ransomware. In it, an attacker using ransomware captured some important files on the computer and sent an ultimatum to the user, that would permanently lock the file if they refused to pay for them.

Often ransomware scans the hard drive of an infected computer, searches for a set of pre-installed keywords to search for documents containing important personal or financial data.

Finjan's report presented a recent incident, when hackers used a spyware called CryZip to block the infected computer with a password and demanded a $ 300 ransom. They leave a message on the phone that explains to the victim what happened and warned them not to tell the police. The victim will receive a password to access the blocked files after they receive the ransom.

Another version of ransomware installs annoying annoying messages on the computer. Every time they start up, they will show up, asking users to pay if they want hackers to delete them from the computer.

" With professional technology people, ransomware can be easily removed. But for ordinary users, especially at home or small businesses, this is really a headache ," said Ben-Itzhak analyst. identify.

" If in the old days, hackers wanted to turn off your computer, then now, cyber criminals want computers to always work, connect to the Web so they can extort money ."

Thien Y

Imitating a model that appeared a few years ago, the rogue spyware removal software was born and proliferated rapidly, thanks to drilling into the user's weak point of psychological fear of spyware. In this form of attack, hackers disguise their malware with a great cover: free anti-spyware application and heavily advertised online. Once the user downloads them, the application will automatically download malicious code or "open the door" of the computer to wait for "accomplices" to attack. In some cases, the tool even ran a fake spyware scanner. They will notify the user to detect some spyware residing in the machine, then direct users to a website. There, users are urged to buy a "perfect" version of the wacky tool. ", a Finjan expert commented. The fact that hackers can create the same antispyware tools is a proof that the spyware industry has grown to an extremely sophisticated, professional and highly qualified level. Another sign of this claim is the increasing frequency of "extortion" attacks, or ransomware. In it, an attacker using ransomware captured some important files on the computer and sent an ultimatum to the user, that would permanently lock the file if they refused to pay for them. Usually ransomware scans the hard drive of an infected computer, searches for a set of pre-installed keywords to track documents containing important personal or financial data. Finjan's report presented a recent incident, when hackers used a spyware called CryZip to block the infected computer with a password and demanded a $ 300 ransom. They leave a message on the phone that explains to the victim what happened and warned them not to tell the police. The victim will receive a password to access the blocked files after they receive the ransom. Another version of ransomware installs annoying annoying messages on the computer. Every time they start up, they will show up, asking users to pay if they want hackers to delete them from the computer. "" analyst Ben-Itzhak said. "".
Update 12 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment