The 5 most 'dirty' tricks of malware

If cyber criminals are behind a little more silly virus, Trojan and destructive software, we don't have to worry that much. Only thing, when the security industry has advanced 'one step' in preventing attacks, they immediately respond to the attack.

If the cyber criminals are behind a little more "silly" virus, Trojan and destructive software, we don't have to worry that much.

Only thing, when the security community has taken a "step" in preventing attacks, they immediately deal with the level of sophistication . 10 times.

Here are 5 of the hacker's most dirty tricks in invading your computer, all based on Trojans.

1. "Don't bother me"

Once hacked into the computer, it will try to disable the security barrier before downloading the actual malware. This malware can steal data or do whatever the hacker wants.

2. Website is locked and encrypted?

The 5 most 'dirty' tricks of malware Picture 1The 5 most 'dirty' tricks of malware Picture 1 Source: Infoworld No problem. Websites can (and should) use SSL to encrypt and protect sensitive data such as bank account login information. (When the padlock icon appears in the address bar, this indicates that the site is using SSL).

However, Gozi Trojan takes advantage of SSL to fool Windows, making Windows think that it is part of the encryption process.

As a result, your data leaves IE, goes through Gozi and is then encrypted and sent to the World Wide Web. Instead of "scouting" for content typed into the keyboard (an activity that will surely be very secure by security software), Gozi Trojan lurks into the operating system as a fake SSL service provider.

3. Specialized malware . kills other malware

Always run a virus scan software that is recommended by experts, yes. But SpamThru Trojan turned that "good thing" into a nightmare. This dirty malware faked a pirated version of Kaspersky Antivirus for users to download.

Then, every time it is activated, it will detect and eliminate other malware to turn the victim PC into "own". From here, SpamThru will freely distribute spam without fear of losing a computer to any opponent.

In case users install other anti-virus software, SpamThru will try to prevent this software from updating new information. Consequently, it will not be identified and detected.

4. Create admin rights yourself

Encrypting sensitive data and then protecting it with a password will help prevent spy eyes. But what happens when "SpyAgent Trojan" also applies this encryption to cover the user's eyes?

When installed on a Windows computer with the File Encryption system (available in Windows 2000, XP Pro, 2003 Server and 2005 Media Center, SpyAgent will set it up for a user account with equivalent admin access). , then use this account to encrypt your files.

You - and your antivirus software - will have to sit guessing what the account's password is if you want to scan the file and delete it from the device.

5. Faking Windows Update to fool the firewall

The firewall has the function of protecting computers and networks against hackers' in-and-out efforts. Therefore, "Jowspry Trojan" disguised as something-know-what-is-there: Windows Update.

This misguided malware mimics its connectivity features exactly like the Windows Intelligent Background Transfer Service uses, so "silly" firewalls will allow it to download more malicious programs.

If you are activating the Windows Update feature, absolutely avoid opening attachments or clicking on links within spam. Use a good anti-virus software if you don't want the opportunity to spread malware.

Trong Cam

5 ★ | 1 Vote