ct logo wslogan

2 minutes reading time (372 words)

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. i-medIT can help with this task--to learn more, reach out to us at 630-549-6199.

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Backup Microsoft Innovation Malware Internet Tech Term Email Android Mobile Devices Data Small Business VoIP Network Security Cybercrime Smartphones Windows Business Data Backup Efficiency Software Cloud Computing Hardware Ransomware User Tips Browser Smartphone Internet of Things Business Management Computers How To Cybersecurity Computer Communications Upgrade Business Continuity Managed IT Services Productivity Mobile Device Management Automation Artificial Intelligence Money Data Recovery Router Chrome Communication Hosted Solutions Network Law Enforcement Social Engineering Collaboration Managed IT Services Data Protection Windows 10 Save Money Vulnerability Alert Bring Your Own Device Connectivity App Gadgets Safety Word Bandwidth Saving Money Phishing Data Security Telephone Systems BDR Server Outsourced IT Data Breach Spam Office 365 Two-factor Authentication Operating System Social Media Disaster Recovery Networking IT Support Miscellaneous Passwords Quick Tips CES Cleaning Sports Paperless Office IT Management Gmail Password OneNote Redundancy YouTube Content Management Windows 10 IT Plan Avoiding Downtime Recovery Comparison Virtualization The Internet of Things Data storage Website Blockchain Physical Security VPN Applications Productivity Unsupported Software Wi-Fi IT Services Government Microsoft Office Private Cloud Google Drive Identity Theft Downtime Remote Monitoring Business Intelligence Apps Managed IT Spam Blocking Public Cloud Internet Exlporer Windows 7 Facebook BYOD Update Data Storage Infrastructure Addiction Meetings Laptop Apple Skype Wireless Charging Wireless Technology Safe Mode Hybrid Cloud Multi-Factor Security Staff Smart Tech Flash Fraud HVAC Hiring/Firing Conferencing End of Support Customer Frequently Asked Questions Workforce Knowledge Files Travel Password Manager Hosted Computing Samsung Cache Patch Management IBM Touchpad iPhone Start Menu Cortana Digital Signature Virtual Assistant Monitor PDF Trending Workplace Tips USB Office Amazon Automobile Enterprise Content Management Emails Internet exploMicrosoft Google Docs Tech Support Value Solid State Drive Hacking Excel Marketing Telecommuting Machine Learning Network Congestion Black Market History Business Mangement Legal Inventory Wireless Internet Scam Supercomputer Data loss Managed Service Provider Tools Google Apps Encryption Telephone System Settings Devices Relocation Sync Amazon Web Services Work/Life Balance Password Management Advertising Shadow IT Audit Tip of the week Remote Work IT Consultant Recycling Access Control Keyboard Specifications Wire Budget Screen Mirroring Employer-Employee Relationship Chromecast HaaS Accountants Entertainment Thought Leadership Big Data Root Cause Analysis Online Shopping NIST Outlook Voice over Internet Protocol HIPAA Computer Fan Windows Server 2008 Electronic Medical Records Software Tips User Error eWaste Uninterrupted Power Supply Going Green Mobile Device Authentication Smart Office Cast Health Workers Holiday Charger Telephony Evernote Data Management NarrowBand Cryptocurrency Netflix Humor Human Resources Nanotechnology FENG Credit Cards Servers webinar Robot Criminal Office Tips Reputation HBO Millennials Document Management Current Events Botnet DDoS Flexibility Practices Computer Care Windows 10s Emergency Worker Thank You Scalability Wearable Technology Assessment Worker Commute WiFi Education Smart Technology Mobility Risk Management Congratulations Search Content Rootkit Television Employer Employee Relationship Computing Infrastructure Two Factor Authentication Politics How to Techology Audiobook Training Information Technology Instant Messaging Troubleshooting Public Computer CrashOverride Computer Accessories Webinar Loyalty Company Culture Best Practice Transportation Vendor Management Bluetooth IT solutions Experience SaaS Remote Computing Users Managing Stress Benefits IT Support Twitter Books Video Games Music Virtual Reality Save Time Wireless Battery Firewall