SMS becomes a trojan spread tool
Hackers are using text messages via mobile phones to entice users to access a malicious website to build the 'zombie' network. This is the content of the warning message that security firm Websense has just released.
Hackers are using text messages via mobile phones to entice users to access a malicious website to build "zombie" networks.
This is the content of the warning message that security firm Websense has just released.
Websense said the security attack uses "social engineering" techniques to entice people to access a dangerous website. An SMS text message is sent to the mobile phone of the user thanking them for registering to use a "virtual" service. The message said it would automatically charge $ 2 a day for the service. This fee will be charged directly to the phone bill. The service can only be stopped when users announce to stop using the "virtual" service through a website.
SMS messages with similar content are also repeatedly sent to a variety of online forums online, security firm Websense warns.
The attack began on Thursday last week in the US and was first discovered by security firm Sunbelt Software.
Once users access the website mentioned in SMS to stop using the service, they will be "encouraged" to download a trojan. Not only that, the attacker also gives detailed instructions on how to bypass security alerts in Internet Explorer.
After Websense named "Dumador" - installed, it turned the victim's PC system into a "zombie" that allowed an attacker to control the system remotely. This PC will become part of the "bot" network that serves attacks online.
" This is the first time we've seen this kind of attack ," said Ross Paul, Websense's senior product manager. " Basically, this attack uses" social engineering "techniques so it has tricked many victims. "
Security firm Websense said the company is currently monitoring the attack but has yet to discover the attacker.
" In general, these attacks are often organized by a group of people. In some cases we know their nicknames. But in some cases it is not ," Paul said.
Websense cannot statistically determine how many people have become victims of this attack. Monitoring the performance of "botnet" networks is a difficult task because this network can be located in many different countries.
Dumador trojan allows an attacker to use the HTTP protocol to control controlled PC systems or trick victims into uploading personal information. The most popular form of "bot" control is through Internet Relay Chat (IRC) channels.
The emergence of new attacks via SMS has proven a new trend in hackers. They are not from any means to attack the victims in order to bring them illegal profits. Trojans, worms, viruses or malware are no longer a way to prove their ability or become as popular as they were in the past. They have become an instrument of real profit. This is a prominent trend of cyber criminals today.
Hoang Dung
You should read it
- Trojans spread on Skype
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- What do you know about the first 'cyber attack' in the world?
- New attack method 'bypasses' security software
- What is a Sybil Attack?
- What is 51% attack? How does 51% attack work?
- Phishing attack: The most common techniques used to attack your PC
- The 3 most popular attacks targeting clouds today
- 5 techniques commonly used by hackers when targeting the retail sector
- Hacker white hat shows offensive and defensive
- Insider attacks are becoming more and more popular and difficult to detect
- Google: 2-factor authentication can prevent 100% of automated bot hacks
Maybe you are interested
How to install Disney Plus as an application on Windows 10 How to use LastPass to manage passwords professionally Microsoft Azure is being used to host malware and C2 servers Synthesis of the most beautiful flower wallpaper for Tet What is AngularJS? How to install Android on a Windows computer without software emulation