ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. i-medIT can help with this task--to learn more, reach out to us at 630-549-6199.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Microsoft Cloud Backup Innovation Small Business Email Smartphones Malware Software Hardware Android Business Cybercrime Efficiency Windows Mobile Devices Data How To Ransomware VoIP Data Backup Network Security Internet Business Continuity User Tips Cybersecurity Cloud Computing Browser Managed IT Services Social Engineering Chrome Mobile Device Management Productivity Business Management Computers Computer Social Media App Data Recovery Money Windows 10 Communication Server Automation Law Enforcement Disaster Recovery Safety Bring Your Own Device Outsourced IT Alert Collaboration Phishing Managed IT Services Gadgets Spam Data Breach Upgrade Data Security Vulnerability Telephone Systems Two-factor Authentication Smartphone Internet of Things Operating System Apps Office 365 Communications Downtime Data Protection Redundancy BDR Windows 10 Avoiding Downtime Comparison Recovery Data Storage Quick Tips VPN Router Saving Money IT Management Government Remote Monitoring Business Intelligence Network OneNote Internet Exlporer IT Plan Data storage Update Passwords Unsupported Software CES Save Money Gmail Spam Blocking The Internet of Things Virtualization BYOD Miscellaneous Artificial Intelligence Physical Security Word Bandwidth Hosted Solutions Private Cloud Google Drive Public Cloud Wi-Fi Wireless Technology Multi-Factor Security Staff Hybrid Cloud Fraud Cleaning Flash Audit Screen Mirroring Budget Password Manager Sports Travel Trending Files Computer Fan PDF Amazon Tech Support Cast Robot Business Mangement Office Netflix Digital Signature History FENG Laptop Amazon Web Services Shadow IT Sync Password Current Events Recycling Relocation Chromecast Specifications IT Support Encryption Touchpad Online Shopping Knowledge eWaste User Error Accountants Evernote Telephony HaaS Network Congestion Criminal Millennials DDoS IT Services Settings Wireless Charging Reputation Skype Holiday IT Consultant Outlook Apple Productivity End of Support Workforce Frequently Asked Questions Root Cause Analysis Cortana Customer Big Data Start Menu YouTube Google Docs Software Tips Flexibility Humor Content Management iPhone Electronic Medical Records Internet exploMicrosoft Charger Telecommuting Excel Marketing Google Apps Hacking Tools Website webinar Blockchain Managed Service Provider Advertising Computer Care Remote Work Tip of the week Windows 10s Automobile Meetings Networking Employer-Employee Relationship Voice over Internet Protocol Legal Conferencing Monitor HIPAA Hiring/Firing Samsung Going Green Identity Theft Uninterrupted Power Supply Windows Server 2008 Work/Life Balance IBM Black Market Workers Patch Management Managed IT NarrowBand Data Management Keyboard HBO Emails Human Resources Health Value Credit Cards Office Tips Windows 7 Solid State Drive Microsoft Office Data loss Facebook Supercomputer Infrastructure Scam Botnet Experience Mobile Device Webinar Computer Accessories Loyalty Transportation Music Video Games IT solutions Bluetooth SaaS Battery Benefits Scalability Information Technology Education Content Firewall Worker Workplace Tips Computing Infrastructure Assessment Wearable Technology Audiobook Techology Smart Technology Remote Computing Rootkit Instant Messaging Applications Television USB Entertainment Two Factor Authentication Training Users CrashOverride Wireless Public Computer Troubleshooting Thank You IT Support WiFi Vendor Management Virtual Reality Congratulations Worker Commute Books Risk Management Mobility Save Time Search Emergency Politics How to Best Practice Employer Employee Relationship