Source code for creating dangerous trojans are on sale!
PandaLabs has just issued a warning about a digital cybercrime network that is currently selling the source code to create the Trj / Briz.A trojan for $ 990 per copy.
PandaLabs said that Trj / Briz.A is a very dangerous form of trojans because it has the ability to collect all data of online banking and financial transactions as well as other data from websites. PandaLabs also affirmed that Trj / Briz.A is the perfect 'work' of a certain black society 'business' that specializes in making money online.
From this source code, high-skilled hackers can produce many other dangerous trojan variants that can infiltrate every computer and silently send to its owner all data such as IP addresses, username, password etc. These sensitive data will allow hackers to completely hijack infected computers remotely.
The file containing Trj / Briz.A trojan is often called 'iexplore.exe', making the user mistakenly assume that this is a new, relevant file or used to activate Internet Explorer. When you activate this file, it will immediately download other malicious files and immediately disable the Windows Security Center and Shared Internet Access features. It then collects data of e-mail managers such as Outlook, Eudora, The Bat . to send back to the attacker. It also prevents complete access to today's popular security websites. Ordinary users hardly have the ability to delete it from the computer.
Luis Corrons, PandaLabs' president, said that the era of hackers creating malicious code for the purpose of playing or claiming to have completely gone. Other types of malicious code like trojan Trj / Briz.A are completely made according to orders completely for the purpose of financial fraud attack. When 'payback' and 'profit' the owner of these malicious codes will sell to other scam gangs who need to use it to get 'reinvested' money into the new generation of malicious code more dangerous.
HOANG KIM ANH
You should read it
- What is QR code?
- Warning: Dangerous new malicious code spills over to Vietnam
- What is Low-Code? And how does it work?
- Detecting a Chrome extension infected with malicious code, stealing the password and the user's e-wallet key
- JavaScript code that generates Pareto chart template with Index/Data . label
- The classic cheat codes, almost every 8x 9x player knows by heart
- Dozens of Android applications are infected with malicious code
- Safe code in C #
May be interested
- Samsung released kernel source for Galaxy S20 smartphonesthe kernel source code is a very important factor for software developers.
- The hacker claimed to successfully steal 63.2GB of Microsoft source code from GitHuban anonymous hacker recently announced that he successfully stole 63.2gb of microsoft source code from github - the largest online code sharing and storage platform in the world.
- Yahoo search source code, Vespa has become open sourceverizon, which bought yahoo, instead of keeping yahoo's promise of controlling search source code, called vespa, eventually turned it into open source.
- This is the most dangerous domain name in the world at the present time, able to access the data of many companiesthat domain is corp.com, although only a blank domain name, does not contain any banned content but is the most dangerous domain name in the world at the present time. it is for sale for $ 1.7 million.
- Lapsus$ hacker group claims to be in possession of Microsoft's source codeon the morning of sunday, march 20, 2022, the lapsus$ hacker group announced that they were in possession of some microsoft source code.
- How to use Qrabber to scan and create QR codes on iPhoneqrabber helps you view and create qr codes and barcodes on iphone with simple steps.
- How to Write a Bill of Sale for an RVa bill of sale documents the paid transfer of goods from one individual to another. it is usually required to transfer a title when selling personal property, such as a car or recreational vehicle (rv). the bill of sale is almost always...
- Kaspersky gave the antivirus software source code to a third party for reviewthe russian antivirus company offers a 'comprehensive transparency initiative', allowing independent third parties to evaluate their source code and internal processes to win users' trust.
- Masslogger - malicious code possesses the ability to steal all the login information of Chrome, Edge Outlook of the targetmasslogger - a notorious trojan that specializes in stealing credentials targeting windows systems that officially have a dangerous 're-export'.
- How to view source, view website source code by phone or computerjoin tipsmake.com.com to learn how to view the source code (view source, view page source) of a website on your phone and computer through the following article!