The 5 most 'dirty' tricks of malware
If cyber criminals are behind a little more silly virus, Trojan and destructive software, we don't have to worry that much. Only thing, when the security industry has advanced 'one step' in preventing attacks, they immediately respond to the attack.
If the cyber criminals are behind a little more "silly" virus, Trojan and destructive software, we don't have to worry that much.
Only thing, when the security community has taken a "step" in preventing attacks, they immediately deal with the level of sophistication . 10 times.
Here are 5 of the hacker's most dirty tricks in invading your computer, all based on Trojans.
1. "Don't bother me"
Once hacked into the computer, it will try to disable the security barrier before downloading the actual malware. This malware can steal data or do whatever the hacker wants.
2. Website is locked and encrypted?
Source: Infoworld No problem. Websites can (and should) use SSL to encrypt and protect sensitive data such as bank account login information. (When the padlock icon appears in the address bar, this indicates that the site is using SSL).
However, Gozi Trojan takes advantage of SSL to fool Windows, making Windows think that it is part of the encryption process.
As a result, your data leaves IE, goes through Gozi and is then encrypted and sent to the World Wide Web. Instead of "scouting" for content typed into the keyboard (an activity that will surely be very secure by security software), Gozi Trojan lurks into the operating system as a fake SSL service provider.
3. Specialized malware . kills other malware
Always run a virus scan software that is recommended by experts, yes. But SpamThru Trojan turned that "good thing" into a nightmare. This dirty malware faked a pirated version of Kaspersky Antivirus for users to download.
Then, every time it is activated, it will detect and eliminate other malware to turn the victim PC into "own". From here, SpamThru will freely distribute spam without fear of losing a computer to any opponent.
In case users install other anti-virus software, SpamThru will try to prevent this software from updating new information. Consequently, it will not be identified and detected.
4. Create admin rights yourself
Encrypting sensitive data and then protecting it with a password will help prevent spy eyes. But what happens when "SpyAgent Trojan" also applies this encryption to cover the user's eyes?
When installed on a Windows computer with the File Encryption system (available in Windows 2000, XP Pro, 2003 Server and 2005 Media Center, SpyAgent will set it up for a user account with equivalent admin access). , then use this account to encrypt your files.
You - and your antivirus software - will have to sit guessing what the account's password is if you want to scan the file and delete it from the device.
5. Faking Windows Update to fool the firewall
The firewall has the function of protecting computers and networks against hackers' in-and-out efforts. Therefore, "Jowspry Trojan" disguised as something-know-what-is-there: Windows Update.
This misguided malware mimics its connectivity features exactly like the Windows Intelligent Background Transfer Service uses, so "silly" firewalls will allow it to download more malicious programs.
If you are activating the Windows Update feature, absolutely avoid opening attachments or clicking on links within spam. Use a good anti-virus software if you don't want the opportunity to spread malware.
Trong Cam
You should read it
- Sophisticated spam Trojan unmatched
- Trojan 2.0 - Implications of Web 2.0 technology
- SonicWall launches anti-malware software
- What is a Trojan? How to avoid trojan attack?
- Risks from malware and how to prevent it
- Instructions on how to remove multi-platform malware on Facebook Messenger
- Offers anti-malware software, protects IObit Malware Fighter 6 PRO computer, for $ 9.95, free of charge
- Trojan inserts ads into OS X browser
- What is Safe Malware? Why is it so dangerous?
- How many types of malware do you know and how to prevent them?
- Hidden Trojan alerts in MP3 music files
- How to avoid Malware
Maybe you are interested
Why do you get motion sickness and how to get rid of motion sickness with medicine, raw ginger, and mint How to turn on automatic email replies on Gmail How to Survive Without the Internet on Vacation 15 photos help you expand your knowledge 12 essential items you should bring when traveling Reasonable suggestions for summer travel abroad