Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. Professional Computer Associates can help with this task--to learn more, reach out to us at 845-876-6561.

Tip of the Week: The Holidays Can Be A Time Of Wor...
IT Outsourcing Has Been Around For A While


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 April 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Managed IT Services Hosted Solutions Malware Disaster Recovery Google Microsoft Software VoIP Business Mobile Devices Business Continuity Email Outsourced IT Internet Productivity Data Innovation Windows 10 Ransomware IT Support Smartphones Efficiency Cybercrime communications Computer Hardware Data Backup Browser Android Office IT Services Cloud Computing Computers Server Alert Telephone Systems Data Recovery Small Business Saving Money Smartphone Business Management Virtualization User Tips Mobile Device Management Windows BDR Quick Tips BYOD Chrome Social Engineering Internet of Things Upgrade Cybersecurity Network How To Avoiding Downtime Collaboration Holiday Private Cloud Productivity Social Media Hacking Miscellaneous Passwords Workplace Tips Office Tips App Firewall Save Money Managed IT Law Enforcement Mobility Microsoft Office Work/Life Balance Recovery Information Technology Health Gmail Redundancy Data Security Office 365 Data Management Remote Monitoring Bring Your Own Device Managed Service Provider Budget Business Intelligence VPN Password Bandwidth Proactive IT Money Two-factor Authentication Flexibility Wi-Fi HaaS Communication Facebook Data Protection Operating System Phishing Compliance Spam Data Breach User Error Marketing Gadgets Big Data Vulnerability Tech Term Black Market Managed IT Services Google Drive Cleaning Artificial Intelligence Identity Theft Risk Management Value SaaS Windows 10 Employer-Employee Relationship Automation Apps Safety Router Battery eWaste Public Cloud Training Mobile Device Remote Computing Wireless Technology Spam Blocking Settings Data loss Content Filtering Applications PDF Charger Update Entertainment Electronic Medical Records Encryption Computing Infrastructure Solid State Drive Physical Security Mobile Computing Hiring/Firing Wearable Technology Computer Care HIPAA Data Storage Workers CES Samsung Downtime Patch Management Business Owner History Keyboard Credit Cards Scam Document Management Best Practice IT Management DDoS Data storage Shadow IT Government End of Support Save Time Word OneNote IT Plan Internet Exlporer Meetings Worker Automobile Unsupported Software Wireless The Internet of Things Apple Legal Comparison NarrowBand Online Shopping Flash Strategy Content webinar Password Manager Public Computer Reputation Hosted Solution Specifications Two Factor Authentication Evernote Education Sync Lithium-ion battery Environment Analysis Files Hybrid Cloud Vendor Management Audiobook Software as a Service Running Cable HBO Streaming Media Conferencing Business Mangement Customer Millennials Chromecast Telephony Windows 10s Accountants Colocation Politics Hard Drives Screen Mirroring Video Games Frequently Asked Questions IT Support SharePoint Recycling Networking Workforce Users Skype Wireless Charging Unified Threat Management Uninterrupted Power Supply Google Docs Cast Scalability Excel Criminal IBM Books Telecommuting Virtual Reality Start Menu Notifications Audit IoT hacker People Fax Server Fiber-Optic Website Instant Messaging Tip of the week Supercomputer Emergency Remote Work Employer Employee Relationship Worker Commute Mobile Computer Fan Smart Tech Mobile Office Knowledge IT solutions Cables Voice over Internet Protocol Search Windows Server 2008 Content Management Current Events Computer Accessories Going Green Professional Services FENG Insurance Network Congestion Unified Communications Robot Tech Support Multi-Factor Security Data Warehousing How to Windows 7 Emails Blockchain Relocation Bluetooth Laptop Tools Antivirus Practices Theft Loyalty Experience Trending Techology Fraud IaaS Regulations Human Resources Transportation Touchpad Hosted Computing Distributed Denial of Service IT Consultant WiFi Cortana Outlook Music Lifestyle Benefits YouTube Amazon Staff Internet exploMicrosoft Botnet Inventory Leadership Google Apps Assessment Humor USB Smart Technology Amazon Web Services Servers Netflix Digital Signature iPhone Advertising Rootkit Travel Root Cause Analysis Software Tips Mouse Infrastructure Television Monitor Troubleshooting Sports Authentication Administration Webinar IT solutions CrashOverride Thank You Access Control Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!