New malware using web application has turned into a source of attack, very difficult to detect
Recently, researchers from Talos (Microsoft) and Cisco have discovered a new type of malware that is very complex and has an extremely fast spreading speed, has infected thousands of computer devices in Europe and America. This malware was named Microsoft Nodersok and Cisco Talos called Divergent.
This type of malware has a very complex mechanism of operation, it turns your computer into a bridge to continue access to the network (Proxy), then transfer to other devices.
Because the new malware has a fast spreading mechanism, hackers only need to create click-frauds, when a user clicks on it and transmits it to other devices via a computer network. Microsoft said hackers could use this malware to launch attacks on enterprise computer systems.

Currently, there is no way to prevent this type of malicious code.
In early August, Windows Defender, Microsoft's antivirus detection software, was rated as one of the best anti-virus software by security researchers at the German AV-TEST Institute. However, according to Microsoft, Windows Defender can currently identify and block Nodersok, but it is difficult to determine which device is distributed.
Therefore, Microsoft encourages users to stay alert to unknown data and avoid launching HTA files in the computer system.
- Beware of deceptive and spreading malicious code via notification links of Google Alert
- Sim vulnerabilities threaten more than 1 billion phones globally
You should read it
- 14 games on the App Store contain malicious code, iPhone users be careful
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent
- Malicious code is growing up
- Microsoft put Windows Defender add-on on Google Chrome
- Find bug in Emotet malware, prevent it from spreading for 6 months
- 10 million Android devices are preinstalled with malicious code from the factory
- Detects malicious code showing porn ads in children's games on Google Play
- Malware sneaks into iOS through Apple's official distribution channels
May be interested
- Prevent malware from breaking into the BIOSmalware (malware) can sneak into the bios in your computer and then activate itself before any anti-malware has a chance to detect it. therefore, you should set the password for the bios.
- Vault 8: WikiLeaks reveals the source code of the CIA malware control systemfor the first time, wikileaks released source code for cia's cyber attack tools.
- What to do to handle 'No Internet After Malware Removal' error?if you've just 'cleaned out' the malware (malware) from your computer and you found that you can't connect to the internet, you can set up a proxy server or dns (domain name system) that has been changed modified by malicious software (malware).
- Online anti-malware toolyou may need to use a utility that can detect, update and process malware automatically. all are available in the latest malware radar system provided by security vendor panda.
- Google can detect cryptocurrency mining malware without needing to install software on the user's computerbecause there is no need to install software, detecting cryptocurrency mining malware will not affect the device's performance.
- What is Application Layer Attack?application layer attack - application layer attacks or layer 7 (l7) ddos attacks refer to a type of malicious behavior designed to target the 'top' layer in the osi model where it occurs. common internet requests like http get and http post.
- What is SquirrelWaffle malware? How to avoid?called dropper malware, the developers of squirrelwaffle have gone to great lengths to keep it hard to detect and analyze.
- What is malware analysis? How are the steps taken?what is malware analysis? in what situations do we need to conduct malware analysis? how is the malware analysis process implemented?
- 5 tips to help detect signs of malwareremoving the spread of malicious code by malware on your computer as quickly as possible will prevent malware from adding any malicious action or infecting other computers.
- Insider attacks are becoming more and more popular and difficult to detectinternal attacks are becoming more and more popular in recent years.