(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. NTConnections can help with this task--to learn more, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 October 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Efficiency Mobile Devices IT Support Google Business Miscellaneous IT Services Managed Service Provider VoIP Server Workplace Tips Business Continuity Network Innovation Data Upgrade Disaster Recovery Hardware Email Computer Software Windows Save Money Saving Money Business Management Mobile Device Management Communication Virtualization Browser Network Security Microsoft Office WiFi Smartphone Smartphones Android User Tips Windows 10 Social Media Operating System Managed IT Services Holiday Hacking BYOD Proactive IT Remote Monitoring Avoiding Downtime Computers Mobile Computing Cybercrime IT Solutions Chrome communications Application Apple Information Technology Office Passwords Budget Marketing The Internet of Things Big Data Alert Quick Tips Small Business Automation Outsourced IT Recovery Employer-Employee Relationship Going Green Collaboration Mobility Remote Computing Health VPN Managed IT Services Data Backup spam Ransomware Social Engineering Telephone Systems App Managed IT Wireless Technology User Error Bring Your Own Device Vendor Management iPhone Save Time Firewall Cybersecurity Gadgets Retail Memory Search Bandwidth Compliance Networking Gmail Lithium-ion battery Private Cloud IT Support Mouse PowerPoint Redundancy Excel Office 365 Phone System Antivirus Downtime History Tablet Analytics Mobile Office Office Tips Hard Drives Customer Relationship Management Public Cloud Facebook Intranet Best Available Phishing How To People Artificial Intelligence Programming Network Congestion Physical Security DDoS Data Storage BDR Robot Word Google Drive Environment Cloud Computing IT Consultant SaaS Law Enforcement Humor Statistics Solid State Drive Safety Saving Time Government Document Management Meetings Risk Management Online Currency Outlook HaaS Website Windows 10 Fax Server Black Market Business Owner Content Filtering Printer Money Data Management Unsupported Software Flexibility Internet of Things Administration Current Events Internet Exlporer Vulnerability Entertainment Data storage Maintenance Running Cable Data Security Biometrics Value Router Skype Unified Threat Management Patch Management Notifications Advertising HBO Managing Stress USB Data loss YouTube Mobile Reputation LinkedIn Wearable Technology Screen Mirroring Virus Frequently Asked Questions Social Touchscreen Debate NarrowBand Professional Services Customers Cast Computer Accessories Best Practice Hybrid Cloud Tip of the week Social Networking Computer Care Chromecast Tools HIPAA Video Surveillance Analyitcs Cameras Consultant Spam Blocking Trending Windows Server 2008 Settings Education Laptop Distributed Denial of Service Business Intelligence Printer Server Windows 7 Virtual Desktop IT service Human Resources Apps Worker Commute Piracy Touchpad Botnet Relocation Data Warehousing Virtual Reality User Computer Fan Uninterrupted Power Supply Regulations Training Domains Licensing Applications Travel Samsung IaaS Files IT Management Bloatware FENG Company Culture Twitter Cleaning Servers Customer Service Windows 8.1 Update Data Recovery Crowdfunding Colocation IT Plan Entrepreneur Workers Tech Support Flash Software as a Service Hacker Hosted Solution Computing Infrastructure Cost Management OneNote Shadow IT Sync Two-factor Authentication Update Wireless Science Windows Media Player Print Server Streaming Media End of Support Software Tips Instant Messaging Telephony Shortcut SharePoint Windows 8 Hiring/Firing Encryption Internet exploMicrosoft WIndows 7 Bluetooth Root Cause Analysis Net Neutrality Computer Repair Sports Start Menu eWaste Audit Tablets Monitor IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scam Charger Scalability Politics Transportation How to webinar Benefits PDF Loyalty Keyboard Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Productivity Password Television Wi-Fi Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Automobile Data Breach Emails Books CrashOverride Mobile Device Work/Life Balance Google Docs IBM Webinar Emergency Worker Users Content Supercomputer