(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. NTConnections can help with this task--to learn more, reach out to us at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Email IT Services Network Security Managed Service Provider Miscellaneous Workplace Tips Innovation Server Data Business Continuity Network Disaster Recovery Upgrade Business Management Software Windows Saving Money Hardware Communication Managed IT Services Computer Smartphone Browser Mobile Device Management Virtualization Android Save Money communications Smartphones Data Backup User Tips Microsoft Office Cybercrime Outsourced IT Holiday BYOD Computers Internet of Things WiFi Windows 10 Small Business Data Recovery Cloud Computing Social Media Hacking Remote Monitoring Chrome Big Data Operating System Ransomware Mobile Computing IT Solutions Alert Apple Collaboration Proactive IT VPN Managed IT Services Avoiding Downtime Application Automation The Internet of Things BDR Employer-Employee Relationship Tech Term Quick Tips Office Budget Information Technology Passwords Marketing Social Engineering Bandwidth Managed IT Gadgets Health Mobility Bring Your Own Device Artificial Intelligence Recovery spam Cybersecurity Going Green Remote Computing Telephone Systems Business Intelligence Document Management Private Cloud Vendor Management Compliance How To iPhone Redundancy Wireless Technology IT Support Office 365 User Error Router Two-factor Authentication Vulnerability Data Security Website Money Save Time Firewall App Data Protection Gmail Value Word Memory Connectivity Retail Search Risk Management Phishing Antivirus Networking Mouse Law Enforcement Analytics Data Management Productivity Identity Theft PowerPoint Windows 10 Excel Phone System Office Tips Content Filtering Downtime Facebook History Apps Entertainment Tablet Lithium-ion battery Physical Security DDoS Saving Time Unified Threat Management Robot Data loss Comparison Skype Windows 7 Mobile Office Environment Google Drive Public Cloud Online Currency Customer Relationship Management Human Resources SaaS Printer Training Best Available IT Management People Servers Safety HIPAA Programming Government IT Plan Cleaning Smart Tech Network Congestion Trending Current Events Meetings CES Education HaaS Unsupported Software Maintenance Fax Server Black Market Content Management Update Solid State Drive Applications Humor Statistics Streaming Media Internet Exlporer Workers Data storage Intranet Biometrics Encryption Sports Business Owner Outlook Credit Cards eWaste OneNote YouTube Flexibility USB Hard Drives Mobile Device Work/Life Balance Administration Infrastructure IT Consultant Analysis Data Storage Running Cable Analyitcs Password Manager Patch Management Advertising Accountants Company Culture Laptop Managing Stress Settings Online Shopping Paperless Office Business Mangement Botnet Scam Windows 8.1 Update Distributed Denial of Service Virus Virtual Desktop Specifications LinkedIn Charger Data Warehousing Students Regulations Touchpad IT service Devices Evernote Virtual Reality Recycling Debate Travel Relocation Hybrid Cloud Uninterrupted Power Supply Computer Accessories IoT Millennials Computer Care Wireless Charging Healthcare Domains Bloatware Criminal Spam Blocking IaaS PDF Print Server Cameras Customer Service Workforce Thought Leadership Video Surveillance Fiber-Optic Electronic Health Records Flash Keyboard Consultant Entrepreneur Software as a Service Tech Support Printer Server Insurance Telecommuting Content Filter Cables Machine Learning Sync Net Neutrality Computer Repair Hacker Worker Commute Cost Management Piracy Computer Fan Software Tips Shadow IT Practices Remote Work Storage Unified Communications HVAC Telephony User Wireless Files Science Instant Messaging Blockchain Licensing FENG Google Docs Password Wi-Fi Shortcut Hosted Computing Addiction Samsung Theft Start Menu Touchscreen SharePoint Colocation Twitter Windows 8 Staff Voice over Internet Protocol Electronic Medical Records Audit HBO Inventory Bluetooth Cache Crowdfunding Cortana Mobile Monitor Hosted Solution Computing Infrastructure Tablets Legal Digital Signature Multi-Factor Security Screen Mirroring Notifications Frequently Asked Questions Access Control Fraud Wireless Internet Google Apps Professional Services Reputation Wearable Technology End of Support Windows Media Player Social Strategy Lifestyle Cast Tip of the week NarrowBand Authentication Amazon Wire Tools Customers Internet exploMicrosoft Best Practice Social Networking Hiring/Firing Root Cause Analysis Windows Server 2008 Chromecast WIndows 7 Nanotechnology Amazon Web Services Smart Office IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Users Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content