(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. NTConnections can help with this task--to learn more, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Managed Service Provider Miscellaneous IT Services Server Disaster Recovery Business Continuity Workplace Tips Upgrade Email Innovation Network Data Hardware Software Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management Smartphones Managed IT Services Network Security Browser Microsoft Office Virtualization User Tips Windows 10 Holiday Smartphone WiFi Android BYOD Data Backup Social Media Outsourced IT Hacking Chrome Operating System communications Mobile Computing IT Solutions Small Business Apple Computers Proactive IT Remote Monitoring Avoiding Downtime Cybercrime Application The Internet of Things Automation Ransomware Alert Quick Tips Social Engineering Office Budget Collaboration Information Technology Big Data Passwords Marketing Recovery Managed IT Services Employer-Employee Relationship Health Mobility Bring Your Own Device VPN Going Green Remote Computing spam Firewall Managed IT Vendor Management Telephone Systems iPhone App Gadgets Cybersecurity Wireless Technology User Error Data Recovery Save Time History Tablet Cloud Computing IT Support Retail Memory Search Office Tips Bandwidth Antivirus Compliance Windows 10 Networking Lithium-ion battery Gmail BDR Analytics Router Private Cloud Mouse PowerPoint Redundancy Artificial Intelligence Website Excel Office 365 Phone System How To Content Filtering Downtime Two-factor Authentication Administration Internet Exlporer Entertainment Data storage Saving Time Biometrics Running Cable Document Management Law Enforcement Value Risk Management Unified Threat Management Skype Solid State Drive Online Currency Mobile Office Hard Drives Customer Relationship Management Data Storage Printer Word Facebook Business Intelligence Best Available People Business Owner Programming Current Events DDoS Network Congestion Physical Security Robot Maintenance Trending Environment IT Management Google Drive Work/Life Balance SaaS Humor Statistics Intranet Safety Government Unsupported Software Meetings Public Cloud HaaS Outlook Fax Server Phishing Vulnerability Black Market Data Management Flexibility Data Security Money Apps IT Consultant Internet of Things Streaming Media Instant Messaging HBO Shortcut Mobile SharePoint Multi-Factor Security Windows 8 Hiring/Firing Screen Mirroring Encryption WIndows 7 Frequently Asked Questions Bluetooth Sports Company Culture Professional Services eWaste Computer Fan Lifestyle Windows 8.1 Update Tablets Cast Monitor Notifications Managing Stress Tip of the week Applications USB Files YouTube Tools Wearable Technology Virus FENG Data Protection Productivity LinkedIn Reputation Social Windows Server 2008 Wi-Fi Debate Colocation NarrowBand Workers Computer Accessories Comparison Customers Best Practice Social Networking Windows 7 Print Server Botnet Hosted Solution Computing Infrastructure Chromecast Cameras OneNote Specifications Analyitcs Data Warehousing Video Surveillance Consultant Regulations Travel Computer Repair Education End of Support Laptop Net Neutrality Settings Distributed Denial of Service Printer Server Millennials Virtual Desktop Servers Worker Commute Human Resources Piracy Internet exploMicrosoft Touchpad IT service Relocation Root Cause Analysis Workforce Virtual Reality IT Plan Uninterrupted Power Supply User Training Flash Domains Software as a Service Licensing Patch Management Advertising Touchscreen IaaS Data loss Bloatware Samsung Cleaning Customer Service Twitter Sync Update Scam Entrepreneur Software Tips Crowdfunding Tech Support Telephony Google Docs Hacker Hybrid Cloud Cost Management Computer Care HIPAA Shadow IT Start Menu Wireless Windows Media Player Spam Blocking Voice over Internet Protocol Science Audit Loyalty Keyboard Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Automobile Data Breach Emails Books Users CrashOverride Mobile Device IBM Webinar Emergency Worker Content Supercomputer IT solutions Telecommuting Rootkit Video Games Audiobook Knowledge Netflix Remote Work Charger Scalability Politics Transportation How to webinar Benefits PDF