ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. i-medIT can help with this task--to learn more, reach out to us at 630-549-6199.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Hackers Cloud Backup Google Microsoft Business Computing Privacy Hardware Innovation Cybercrime Efficiency Small Business Malware Data Cybersecurity Android Business Productivity Ransomware Managed IT Services Smartphones Email Internet Mobile Devices Business Continuity Software Server Automation Computers Safety Network Security Operating System Mobile Device Management Gadgets Social Media Business Management VoIP Upgrade App User Tips How To Chrome Spam Data Breach Computer Windows Law Enforcement Data Backup Browser Network Word Internet Exlporer Data storage Physical Security Disaster Recovery Save Money Passwords Private Cloud Google Drive Data Storage Bring Your Own Device Windows 10 Public Cloud Miscellaneous The Internet of Things Office 365 Redundancy Avoiding Downtime Bandwidth Hosted Solutions Unsupported Software Telephone Systems Smartphone Phishing Communication Money Spam Blocking Government Downtime Data Security Windows 10 Social Engineering Recovery Quick Tips Alert Collaboration Saving Money Hacking Screen Mirroring Budget Tip of the week Marketing Managed Service Provider Computer Fan Advertising Cast BDR Automobile DDoS Windows Server 2008 Artificial Intelligence Managed IT Netflix Outlook FENG Cloud Computing Current Events Windows 7 Gmail Botnet Health IT Support Humor YouTube Wi-Fi IT Management Knowledge Microsoft Office Flash Facebook Travel OneNote Virtualization Hybrid Cloud IT Plan Network Congestion Files Settings Monitor Office Going Green IT Consultant Uninterrupted Power Supply Productivity Sync Data Recovery History Black Market Root Cause Analysis NarrowBand Relocation Software Tips Office Tips Remote Monitoring Internet of Things Wireless Technology Router BYOD webinar Cleaning Telephony Sports Computer Care Update User Error Windows 10s Meetings Networking HaaS Conferencing Tech Support Hiring/Firing Skype Samsung IT Services Robot Vulnerability Reputation IBM Patch Management Frequently Asked Questions Apple HBO Laptop Emails Shadow IT Start Menu Value Outsourced IT End of Support Solid State Drive Customer Data loss Chromecast Supercomputer Excel Tools Flexibility iPhone Touchpad Audit Managed IT Services Internet exploMicrosoft Worker Commute Transportation Bluetooth Mobility IT solutions Risk Management SaaS Search Benefits Legal Thank You Politics How to Work/Life Balance Firewall Worker Best Practice Congratulations Keyboard Assessment Wearable Technology Smart Technology Experience Rootkit Mobile Device Television Apps USB Communications Two Factor Authentication Music Training Video Games CrashOverride Public Computer Battery Troubleshooting PDF Vendor Management Scalability Education Data Management Big Data Information Technology Password Content Electronic Medical Records Charger Workplace Tips Computing Infrastructure Books Techology Audiobook Save Time Instant Messaging Applications Emergency Entertainment WiFi Users Wireless IT Support Holiday Employer Employee Relationship VPN Google Docs Virtual Reality Scam Webinar Computer Accessories Remote Computing Loyalty Website