Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. Professional Computer Associates can help with this task--to learn more, reach out to us at 845-876-6561.

Tip of the Week: The Holidays Can Be A Time Of Wor...
IT Outsourcing Has Been Around For A While


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Managed IT Services Malware Disaster Recovery Microsoft VoIP Google Business Software Business Continuity Mobile Devices Productivity Outsourced IT Email Data Internet Smartphones Windows 10 communications Computer Hardware IT Support Innovation Efficiency Android Cybercrime Office Ransomware Alert Server Data Backup IT Services Browser Telephone Systems Computers Saving Money Business Management Windows Small Business Social Engineering Chrome Upgrade User Tips Mobile Device Management Quick Tips Hacking Smartphone Social Media Office Tips Miscellaneous Passwords Workplace Tips App Firewall Managed IT Cybersecurity Cloud Computing Save Money Virtualization Mobility How To Law Enforcement Work/Life Balance Data Recovery Network Avoiding Downtime Recovery BDR Microsoft Office BYOD Collaboration Holiday Office 365 Budget Bring Your Own Device Managed Service Provider Password Two-factor Authentication Communication Proactive IT Flexibility Money Wi-Fi Bandwidth HaaS Facebook Information Technology Health Operating System Productivity Private Cloud Data Management Black Market User Error Marketing Artificial Intelligence Internet of Things Google Drive Windows 10 Value SaaS Risk Management Phishing Router Employer-Employee Relationship Automation Spam Compliance Safety Data Breach Redundancy Gmail Managed IT Services Remote Monitoring Gadgets Hiring/Firing Workers Computing Infrastructure Computer Care Business Intelligence Identity Theft Physical Security Mobile Computing Entertainment Samsung Patch Management Credit Cards Business Owner Keyboard Downtime Scam IT Management Cleaning Wearable Technology OneNote History Word Save Time Best Practice Data storage Unsupported Software Shadow IT VPN Government Worker Automobile End of Support Internet Exlporer Apps DDoS Data Security Battery Spam Blocking The Internet of Things Mobile Device Meetings Wireless Content Filtering Apple Public Cloud Remote Computing Applications Vulnerability Charger Wireless Technology Solid State Drive Data Storage Settings Remote Work Tip of the week Virtual Reality Running Cable HIPAA Computer Fan Streaming Media Infrastructure Mobile Supercomputer Voice over Internet Protocol Emergency Uninterrupted Power Supply Instant Messaging Knowledge Employer Employee Relationship Windows Server 2008 Worker Commute FENG SharePoint hacker Password Manager Professional Services Current Events Multi-Factor Security Data Warehousing Encryption Search Network Congestion Computer Accessories Windows 7 Emails Tools People Trending Notifications How to Fax Server Fraud Bluetooth Regulations Document Management Going Green Experience Techology Loyalty Mobile Office Lifestyle Robot Transportation IT Plan Tech Support IT Consultant IT solutions Amazon Relocation Wireless Charging Laptop Music Botnet Data Protection Benefits Leadership IaaS Amazon Web Services Fiber-Optic Servers Netflix Travel Touchpad USB Root Cause Analysis Assessment Comparison Outlook Smart Technology Software Tips Antivirus Online Shopping Cables Rootkit Flash YouTube Troubleshooting Legal Internet exploMicrosoft Television Specifications Humor webinar Distributed Denial of Service WiFi Evernote iPhone Unified Communications Training Sync Content Public Computer Software as a Service Hosted Solution Data loss Advertising Millennials Monitor Two Factor Authentication HBO Sports Education Conferencing Audiobook Windows 10s Theft Vendor Management Telephony NarrowBand Update Screen Mirroring Workforce Reputation Frequently Asked Questions IT Support Politics Mouse Hard Drives Files Cortana Skype Networking Google Docs Big Data Cast Video Games eWaste Hybrid Cloud Telecommuting Customer Electronic Medical Records Excel Users Audit Colocation Google Apps Unified Threat Management Start Menu Chromecast IBM Website Books Lithium-ion battery Scalability Environment PDF Administration Business Mangement Webinar Recycling IT solutions CrashOverride Thank You Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!