New hacker tricks, increasingly more sophisticated, to avoid being exposed
Recently, security firm Fortinet (USA) has released a report on cyber security threats. According to this report, cybercriminals are becoming more and more sophisticated in cloaking and anti-analysis activities to avoid being exposed.
For example, Fortinet found that hackers using impersonating e-mail with an Excel attachment contained a program running inside a malicious file (macro) during a spam distribution campaign. This macro has the ability to disable security tools, cause memory problems, execute arbitrary commands. The special thing is that it is designed to run only on Japanese systems. This procedure makes it difficult for normal network security measures to detect malicious code.

Another example is a variant of the Dridex malware. Every time the victim logs in, this malicious code has the ability to constantly change the names and hash functions of the files. This makes it difficult to detect malicious code on infected server systems.
Similarly, Zegost malware uses sophisticated technology to erase all archives of operational history and run below the radar control. Hackers even put orders to keep this malicious information from staging and only start to carry out the infection when February 14, 2019, prevented the security tools from transmitting. appear now.
Meanwhile, instead of mass attacks, profiteering speculation, spyware and extortion are now turning to clear-targeted attacks, targeting specific companies and organizations. for ransom. Hackers have carefully studied the target, looking for security holes before deploying attacks to be able to execute arbitrary code without any interaction from the user.
According to Fortinet, extortion software is still a serious threat to companies, so it is necessary to prioritize patch development and improve awareness of information security. In addition, hackers can take advantage of the security holes of the remote computer control protocol (RDP) to spread malicious ransom.
According to the security firm, in order to protect itself from ever-growing cyber security threats, companies need to develop appropriate plans and implement integrated security solutions.
- Hackers claim to be able to 'shutdown' 25,000 cars in just one note
You should read it
- List of the 3 most dangerous and scary Ransomware viruses
- GandCrab blackmail extinguished after earning $ 2.5 billion worldwide
- Malware and user security bugs are found in top free VPN applications
- New ransomware appeared not to send Bitcoin, money, but ... nude photos !!!
- Serious vulnerability in Microsoft Word is being used by hackers to install malware on computers
- Threats and risks from malware on USB Flash
- Ako ransomware is raging all over the world, what do you know about this ransomware?
- The scary scenario of the spread of GhostCtrl malware on Android devices
May be interested
- Vietnamese hackers collect phone numbers of more than 267 million Facebook users?diachenko said that hackers with ip addresses in vietnam illegally collected this database in order to deceive the facebook user party.
- Teen hacker is believed to be behind the notorious hacker group Lapsus$in recent weeks, the lapsus$ hacker group has appeared in the media. security researchers are actively investigating the activities of the lapsus$ hacker group.
- 10 tips to help you avoid hacker trapusing computers is familiar in a modern and vibrant city like hongkong. in 2009, the number of internet-related crimes increased dramatically ...
- Why is Facebook account hacked?currently, the situation of fraud and instant messaging via facebook takes place very much. and also a lot of people have become victims of hackers when they believe in the false information. hacker tricks are diverse: phishing messages in the form of winning programs, posting links of photos, sensitive videos tricking users into clicking ...
- Hackers use AI to commit online fraud: Experts can also fall into the trapeven experienced cybersecurity professionals fall victim to sophisticated phishing attacks.
- Appears a free game that allows you to practice being a hackeranonymous hacker simulator is a simulation game, allowing you to transform into a professional white hat hacker with the mission to uncover the conspiracy behind the civil data surveillance program of a dark organization.
- Learn 8 online hacker training programs for only 39 USDbecause personal data, widely publicized security vulnerabilities are becoming increasingly popular, moral hackers, or white-hat hackers, are being hunted by businesses to help them maintain. maintaining network and data security.
- How to identify SSD hard drive is real or fakecurrently, clone ssd drives are rampant with many sophisticated tricks so users are easily fooled. therefore, use the following tips to avoid buying poor quality ssds.
- 10 types of people you should avoid as far as possible in your lifeto avoid being negatively affected by others, you should stay away from the following 10 types of people, or at least limit your exposure as much as possible. invite you to read!
- 8 types of people you should avoid as far as possiblethere are many people like dark clouds, if you don't meet them, your life will be bright and full of bright sunlight. here are 8 types of people you should avoid as far as possible.