(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. NTConnections can help with this task--to learn more, reach out to us at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency Business VoIP IT Support Email Miscellaneous IT Services Managed Service Provider Innovation Server Workplace Tips Disaster Recovery Business Continuity Network Data Windows Upgrade Business Management Software Network Security Hardware Communication Computer Save Money Saving Money Mobile Device Management Virtualization Smartphones Android Browser Smartphone Microsoft Office communications Managed IT Services User Tips Holiday WiFi Data Backup Windows 10 Outsourced IT BYOD Small Business Computers Social Media Remote Monitoring Cybercrime Hacking Chrome Operating System Mobile Computing Alert Apple Proactive IT Managed IT Services Avoiding Downtime Big Data Application IT Solutions Employer-Employee Relationship Quick Tips Office Budget Collaboration Cloud Computing Information Technology Passwords Ransomware Marketing Social Engineering Data Recovery The Internet of Things Automation Gadgets Mobility Health Bring Your Own Device VPN Recovery Going Green spam Remote Computing Telephone Systems BDR Vendor Management Private Cloud Bandwidth How To Compliance iPhone Managed IT Wireless Technology User Error Two-factor Authentication Internet of Things Save Time Cybersecurity Firewall App Gmail Retail Memory Search Antivirus Vulnerability Data Security Networking Mouse Redundancy Analytics Router IT Support Office 365 Data Management Artificial Intelligence PowerPoint Windows 10 Business Intelligence Website Excel Phone System Office Tips Content Filtering Money Downtime History Tablet Lithium-ion battery Document Management Value Risk Management Online Currency Google Drive Public Cloud Mobile Office Environment Customer Relationship Management Human Resources Phishing Printer SaaS Training Identity Theft Best Available Safety HIPAA People Current Events Programming Government Network Congestion Credit Cards Maintenance Meetings Trending HaaS Fax Server Black Market Law Enforcement Solid State Drive Humor Statistics Intranet Data Storage Internet Exlporer Workers Word Data storage Biometrics Business Owner Outlook eWaste OneNote Flexibility Hard Drives Apps IT Consultant IT Management Work/Life Balance Facebook Administration Entertainment IT Plan Saving Time Running Cable Physical Security DDoS CES Unified Threat Management Robot Skype Unsupported Software Laptop Managing Stress Settings Cables Sync Update Scam Distributed Denial of Service Content Management Virus Virtual Desktop Remote Work LinkedIn Charger Software Tips Touchpad IT service Unified Communications Telephony Debate Google Docs Relocation Hybrid Cloud Virtual Reality Blockchain Computer Accessories Computer Care Uninterrupted Power Supply Print Server Domains Theft Start Menu Staff Spam Blocking Voice over Internet Protocol Audit IaaS Bloatware Cameras Customer Service Video Surveillance HBO Cleaning Mobile Keyboard Consultant Cortana Net Neutrality Education Multi-Factor Security Computer Repair Screen Mirroring Entrepreneur Printer Server Fraud Frequently Asked Questions Tech Support Professional Services Hacker Google Apps Piracy Computer Fan Lifestyle Cast Worker Commute Cost Management Shadow IT Applications Amazon Tip of the week Tools User Wireless Files Science Infrastructure Instant Messaging Touchscreen Licensing FENG Data Protection Productivity Streaming Media Password Wi-Fi Shortcut Amazon Web Services Samsung Windows Server 2008 SharePoint Colocation Twitter Windows 8 Password Manager Comparison Electronic Medical Records Encryption Sports Bluetooth Online Shopping Crowdfunding Windows 7 Botnet Monitor Hosted Solution Computing Infrastructure Tablets Business Mangement Specifications Data Warehousing Notifications Legal YouTube USB Evernote Regulations Travel Reputation Wearable Technology End of Support Recycling Windows Media Player Social Millennials Mobile Device NarrowBand Wireless Charging Servers Customers Internet exploMicrosoft Criminal Social Networking Hiring/Firing Root Cause Analysis Workforce Best Practice Chromecast WIndows 7 Fiber-Optic Flash Software as a Service Patch Management Advertising Analyitcs Company Culture Data loss Telecommuting Windows 8.1 Update Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Digital Signature Windows 10s Smart Technology Users Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games