ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. i-medIT can help with this task--to learn more, reach out to us at 630-549-6199.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Hackers Privacy Cloud Backup Microsoft Business Computing Innovation Smartphones Hardware Small Business Data Business Cybercrime Software Ransomware Efficiency Email Data Backup Malware Cybersecurity User Tips Android Managed IT Services Productivity Social Engineering How To VoIP Chrome Internet Windows Business Continuity Mobile Devices Network Security Operating System Social Media Browser Server App Automation Disaster Recovery Safety Windows 10 Bring Your Own Device Mobile Device Management Law Enforcement Gadgets Business Management Upgrade Outsourced IT Data Recovery Spam Data Breach Collaboration Managed IT Services Communication Computer Computers Google Drive Windows 10 Recovery Wi-Fi Public Cloud Quick Tips Office 365 BDR Saving Money Network Word Internet Exlporer Cloud Computing Data storage Data Storage Two-factor Authentication Money IT Management Save Money Passwords Router Government Miscellaneous Unsupported Software The Internet of Things Redundancy Avoiding Downtime Hosted Solutions Bandwidth Phishing Spam Blocking Alert Telephone Systems Smartphone Data Security Physical Security Artificial Intelligence Downtime Private Cloud Skype Solid State Drive Tech Support Value Work/Life Balance Scam Robot Health Data loss Supercomputer Workforce Frequently Asked Questions Start Menu Laptop Audit Shadow IT Microsoft Office Facebook Google Docs Screen Mirroring Budget Apps Telecommuting Hybrid Cloud Excel Chromecast Tools Touchpad Computer Fan Communications Website Files Cast Netflix Remote Work Tip of the week Office FENG Voice over Internet Protocol History Current Events IT Support DDoS Windows Server 2008 Managed IT Relocation Outlook Knowledge Windows 7 Botnet OneNote Gmail Multi-Factor Security Humor User Error IT Plan YouTube Network Congestion Settings Flash HaaS Travel Productivity IT Services Trending IT Consultant Virtualization Reputation Apple Root Cause Analysis Comparison Monitor End of Support Software Tips Going Green Customer Uninterrupted Power Supply Sync Flexibility Black Market iPhone Specifications Internet exploMicrosoft BYOD NarrowBand webinar Hacking Windows 10s Office Tips Computer Care Marketing Remote Monitoring Internet of Things Managed Service Provider Meetings Networking Hiring/Firing Business Intelligence Advertising Wireless Technology Conferencing Telephony Vulnerability Cleaning Samsung Automobile Update Sports IBM Patch Management Emails Millennials HBO Best Practice WiFi Keyboard Webinar Computer Accessories Loyalty Transportation Mobile Device VPN Experience IT solutions Bluetooth SaaS Music Benefits Video Games Remote Computing Battery PDF Firewall Scalability Worker Education Information Technology Password Assessment Thank You Content Wearable Technology Smart Technology Workplace Tips Rootkit Computing Infrastructure Techology Television Congratulations Audiobook USB Two Factor Authentication Instant Messaging Training Applications CrashOverride Public Computer Entertainment Troubleshooting Vendor Management Users Wireless IT Support Holiday Big Data Electronic Medical Records Charger Virtual Reality Books Data Management Save Time Worker Commute Mobility Risk Management Emergency Search Legal Politics Employer Employee Relationship How to