Detecting a new type of malware that steals Windows passwords, installs a virtual currency mining tool and continues to spread trojans
The malicious code called MosaicLoader is capable of installing Bitcoin miners and spreading malicious code.
Security software firm Bitdefender revealed that malicious code developed specifically for the Windows operating system called MosaicLoader will try to infect as many victims as possible. Unlike many viruses that spread through phishing attacks or unpatched software, MosaicLoader is a virus that is even advertised to potential victims.
The workstations can be threatened if unfortunately for MosaicLoader to get in and continue to spread other malicious code. One of them is Gupteba, a malicious code capable of developing backdoor systems to collect sensitive information, including passwords, usernames or financial information.
When users search for cracked versions of software, links to malicious websites show up at the top of the search results page. Because of the automated processes that trigger to buy and display ads, not everyone knows that ads are endangering users except for attackers.
People who work from home are more likely to download malicious code than people who work in offices.
According to Bitdefender, people who work from home are more likely to download pirated software than people who work in the office. Although anti-virus software can prevent malicious code, to comply with the installation regulations, many users who download illegal software are forced to turn off system protection when installing software.
Many crack (jailbreak) applications will mimic the metadata of real software files to make the software download and installation look the most professional and reliable. However, the danger behind that is something not everyone knows.
After downloading and installing the malicious software MosaicLoader, it will allow the attacker to access the victim's PC. Attackers can obtain usernames and passwords of online accounts, the researchers warn. The presence of additional malicious code on the compromised Windows computer shows that the main goal of the attacker is to steal information.
Users should be careful when following the advice of disabling anti-virus software because this can lead to the installation of malicious software, potentially at risk of remote system intrusion.
You should read it
- What is Safe Malware? Why is it so dangerous?
- Can a VPN Fight Malware?
- What is Malware? What kind of attack is Malware?
- The 4 most common ways to spread malware today
- Learn about polymorphic malware and super polymorphism
- What is Goldoson Malware? How can you protect yourself?
- What is rooting malware? What can you do to protect yourself?
- Some simple tricks to deal with Malware
May be interested
- Norton antivirus adds Ethereum mining featureusually, anti-virus software will be designed to destroy the stealthy cryptocurrency miners on your computer. however, nortonlifelock (formerly symantec) had a groundbreaking way of thinking.
- The exchange crashed, turning many virtual currency investors into USD billionaires in a few hourson tuesday, the price of virtual currencies on some exchanges just increased to an absurd level, turning many investors into usd billionaires. for example, the price of bitcoin rose to $789 billion in a short period of time.
- Watch out for new dangerous viruses similar to WannaCryanother type of computer virus that exploits a security hole in the windows operating system, such as the wannacry malicious code, has spread more than 200,000 devices and helped hackers hack silver.
- ICP Just appeared 1 day, the infinity virtual currency is causing market feverafter more than 1 day of launch, the digital currency with the very popular name 'internet computer' has jumped to the 8th position in the ranking of digital currencies with the largest total market capitalization on the market today.
- Cryptocurrency exchange Liquid had $90 million stolen by hackersliquid just had to stop some virtual currency trading activities on their exchange after discovering that the system was compromised by hackers. by trading volume, liquid is one of the largest fiat currency exchanges in the world.
- How to dig virtual money on iPhone with MobileMinerwhen thinking of a virtual money mining device, people often think of large-sized devices with multiple gpus. however, it is not always necessary to dig virtual money to a specially designed equipment rig. with mobileminer application, you can exploit virtual currency on a small device like iphone.
- Catch up with high-end malware?businesses are still looking for a more effective way to battle against malware like viruses, trojans and bots. regrettably, the 'black hat' programmer continues to constantly mix more dangerous new codes. therefore companies also need to update
- How to mining CHIA coin (XCH) on Windows operating systemssplit blockchain is a new cryptocurrency, using proof of space and time. below is a guide on how to mine chia virtual currency on a personal computer at home.
- Differentiate types of malwaresome people have a habit of calling all malicious software (malicious software) under a common name as computer virus, but this is completely incorrect. viruses, worms and trojans are different types of malicious software with different behaviors. in particular, they spread themselves in many ways.
- Life inside the 'Bitcoin mines' secretlylet's visit a bitcoin mining mine in china to see how everyday people work to find these virtual coins.