What to Know About Peaklight: New Stealth Malware Targets Illegal Movie Downloads
When downloading illegal media, there is always a risk that you will download more than you expected. Malware developers love to attach their malware to fake media files to trick people into downloading them.
What is Peaklight?
Peaklight is a malicious application – but it can't cause any damage on its own. Instead, it acts as a downloader that installs damaging processes onto your PC. If you imagine Peaklight as a gun and the bullets it fires as malware, you'll get an idea of what it does.
Google has reported that Peaklight attacks on people's systems have increased dramatically. And unfortunately for copyright violators, it specifically targets people who want to download movies illegally.
How does the Peaklight attack work?
The Peaklight downloader gets into people's systems using a sneaky trick. A malicious actor uploads an LNK file with a custom icon disguised as a movie file. The LNK file itself is not malicious, but the malware publishers can program it to perform malicious actions. In this case, the LNK file is programmed to open PowerShell and use it to download Peaklight.
Once the malicious agent sets up the trap, it's time for them to wait for someone to trigger it.
Victims download pirated movies
The attack starts when someone searches online for a movie to illegally download. They visit a website that performs an automatic download, and then the Peaklight attack is injected into their system as a ZIP file.
Inside the ZIP file is an LNK file disguised as a movie file. The victim may believe they have downloaded the movie they are looking for and double-click the file to open the "movie". This will trigger the script in the LINK file.
Victim activates downloaded LNK file
Now that the LNK file is active, it will open PowerShell and issue a command to download Peaklight. It uses special tactics to confuse anti-virus applications to hide its purpose.
Peaklight runs entirely in the computer's memory to hide its tracks, rather than running in the target's memory. This is a particularly effective tactic used by malware to make it harder to detect, as the system's antivirus software must actively scan the RAM to detect Peaklight's presence.
Peaklight downloads its payloads to the target PC
When Peaklight runs on a target PC, it does a quick check to see if the computer has installed the payloads. If not, it starts downloading and running malicious services. Google found it downloading LUMMAC.V2, SHADOWADDER, and CRYPTBOT, all of which are focused on stealing information like cryptocurrency wallets.
How to avoid getting infected with Peaklight
Unfortunately, pirating movies and software online is dangerous, not to mention illegal. There are many malicious actors on the Internet who aim to exploit people searching for popular movies online and trick them into downloading malicious files. So, if you're not pirating, you'll want to stay away from Peaklight.
Even if you don't download illegal files, this is a good lesson in how to deal with automatic downloads. If you visit a website and find that it automatically downloads something to your computer without your permission, proceed with extreme caution.
Sometimes automatic downloads are perfectly safe. For example, if you find a PDF file in a Google search and click the link, your browser may automatically download the file to your hard drive. However, if the downloaded file contains something you can execute or run, it's best to delete it.
The Peaklight malware is particularly dangerous because it targets people looking for an easy way to get a free movie. If you're worried about your system being infected with malware, always enjoy media through legal means and make sure anyone else who uses your PC does the same.
You should read it
- 15 websites for free and effective English learning at home
- Laptops based on Samsung's Montevina platform
- What is Domain Authority?
- These quality hard drive defragmentation software
- Some ways to tie the pole or everyone should know
- Video statistics market share of all versions of Windows from 2003 to present: Success mixed with regret
- How to Make Lo‐Fi Music
- How to recover deleted posts on Facebook
- The features on iOS 14 that Android should learn
- Page numbering steps in Microsoft Word Microsoft
- 6 best Linux desktop environments in 2022
- How to Rename MacBook