Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. Professional Computer Associates can help with this task--to learn more, reach out to us at 845-876-6561.

Tip of the Week: The Holidays Can Be A Time Of Wor...
IT Outsourcing Has Been Around For A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Mobile Devices Disaster Recovery Microsoft Productivity Software Business Continuity Email Business Internet Innovation Outsourced IT Data Data Backup Cybercrime Efficiency communications Smartphones Windows 10 Ransomware Computer IT Support Android Cloud Computing Data Recovery Hardware IT Services Browser BDR Office Internet of Things Tech Term Telephone Systems Alert Windows Computers Saving Money Server Business Management Upgrade Virtualization Network User Tips Mobile Device Management Cybersecurity Small Business Smartphone Save Money Law Enforcement Microsoft Office Managed IT Quick Tips BYOD Collaboration Social Engineering Chrome Workplace Tips Money Bandwidth Artificial Intelligence Recovery Facebook Communication Password Private Cloud How To Holiday Hacking Office 365 Mobility Work/Life Balance Router Social Media Office Tips Miscellaneous Avoiding Downtime Managed Service Provider Passwords App Productivity Firewall Business Intelligence Proactive IT VPN Remote Monitoring Two-factor Authentication HaaS Automation Budget Data Protection Health Information Technology Operating System Redundancy Phishing Gmail Flexibility Data Security Wi-Fi Data Management Bring Your Own Device Applications Big Data SaaS Identity Theft Risk Management Windows 10 Employer-Employee Relationship Word Safety Value Blockchain Document Management Spam Gadgets Apps User Error Marketing Black Market Entertainment Compliance Vulnerability Google Drive Mobile Device Managed IT Services Cleaning Data Breach Connectivity Networking Paperless Office Electronic Medical Records Best Practice Shadow IT Solid State Drive Data storage Government Credit Cards Windows 7 End of Support Hiring/Firing Computer Care Internet Exlporer HIPAA IT Management DDoS YouTube CES Smart Tech Samsung OneNote IT Plan The Internet of Things Patch Management Content Management Business Owner Sports Keyboard Meetings Unsupported Software Scam Wireless Servers Public Cloud Apple Remote Computing Comparison Wireless Technology eWaste Save Time Automobile Settings PDF Spam Blocking Worker Data loss USB Computing Infrastructure Streaming Media Access Control Physical Security Mobile Computing Infrastructure Legal Update IT Support Battery Encryption Training Analysis Education Wearable Technology Downtime Data Storage Content Filtering Website History Workers Charger Relocation Knowledge IT solutions Recycling Video Games Voice over Internet Protocol Windows Server 2008 Laptop Cryptocurrency Users Unified Threat Management Devices Wireless Charging Professional Services FENG Data Warehousing IBM Network Congestion Students Books IaaS Criminal Scalability Multi-Factor Security Virtual Reality Emails Touchpad Safe Mode IoT Antivirus Thought Leadership Fiber-Optic Tools Outlook Supercomputer Healthcare Emergency Instant Messaging Trending Worker Commute Fraud Regulations Internet exploMicrosoft File Sharing Employer Employee Relationship Humor Content Filter Cables Lifestyle iPhone Current Events Distributed Denial of Service IT Consultant Electronic Health Records WiFi Search Insurance Amazon Advertising Business Technology Computer Accessories Monitor Storage Unified Communications Botnet Leadership NarrowBand Machine Learning How to Practices Amazon Web Services Netflix Virtual Assistant Bluetooth Root Cause Analysis Reputation Loyalty Experience Theft Techology Travel Software Tips Files Mouse Transportation Human Resources Hosted Computing Online Shopping Flash Hybrid Cloud Telephone System Customer Addiction Music Cortana Specifications Colocation webinar Chromecast Benefits Staff Environment Inventory Evernote Sync Lithium-ion battery Assessment Running Cable Cache Google Apps Software as a Service Millennials HBO Conferencing HVAC Smart Technology Digital Signature Uninterrupted Power Supply Telephony Windows 10s Rootkit Screen Mirroring Television Wireless Internet Troubleshooting Workforce Frequently Asked Questions hacker Enterprise Content Management SharePoint Strategy Authentication Content Skype Cast Public Computer Wire Hosted Solution Password Manager Google Docs Telecommuting Excel Password Management Two Factor Authentication Nanotechnology Audiobook People Start Menu Notifications Audit Vendor Management Smart Office Fax Server Business Mangement Remote Work Tip of the week Going Green NIST Accountants Tech Support Politics Mobile Office Hard Drives Mobile Computer Fan Robot Webinar IT solutions CrashOverride Thank You Twitter Company Culture Congratulations Managing Stress Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!