Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. Professional Computer Associates can help with this task--to learn more, reach out to us at 845-876-6561.

Tip of the Week: The Holidays Can Be A Time Of Wor...
IT Outsourcing Has Been Around For A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 October 2017

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Malware Disaster Recovery Managed IT Services Business Continuity Microsoft Software Business VoIP Mobile Devices Google Productivity Data Internet Windows 10 Hardware Innovation Efficiency IT Support Outsourced IT Computer Smartphones Cybercrime Office Ransomware Server Email IT Services Browser Alert Android Telephone Systems Saving Money communications Upgrade Quick Tips Mobile Device Management Computers Business Management Chrome Workplace Tips Save Money Passwords Virtualization App Law Enforcement Firewall Network Recovery BYOD Data Backup Managed IT Cybersecurity User Tips Windows Hacking Mobility Microsoft Office Small Business Avoiding Downtime Social Media Miscellaneous HaaS Budget Health Information Technology Private Cloud Facebook Flexibility Operating System Social Engineering Office Tips Managed Service Provider Collaboration Office 365 Smartphone Proactive IT Productivity Remote Monitoring Automation Safety Managed IT Services Bandwidth Redundancy Password BDR Cloud Computing Wi-Fi Data Management Black Market Work/Life Balance Bring Your Own Device Gmail Holiday Communication Google Drive User Error Marketing Data Breach Phishing SaaS How To Spam Money Data Security Data storage Shadow IT Government Spam Blocking End of Support Wearable Technology Solid State Drive Internet Exlporer Hiring/Firing Computer Care The Internet of Things Samsung VPN Artificial Intelligence Patch Management Risk Management Business Owner Value Data Storage Public Cloud Remote Computing DDoS Employer-Employee Relationship Wireless Technology Save Time Meetings Gadgets Wireless Computing Infrastructure Automobile Apple Worker Windows 10 Physical Security Router Word Internet of Things Compliance Battery Settings Unsupported Software Downtime Cleaning History Entertainment Applications Best Practice Networking Big Data webinar Video Games Users IaaS Sync Electronic Medical Records Unified Threat Management Data loss Notifications Touchpad People Software as a Service IBM HBO Books Conferencing Outlook Scalability Fax Server Virtual Reality YouTube Telephony Windows 10s Screen Mirroring Internet exploMicrosoft HIPAA Mobile Office Update Supercomputer Frequently Asked Questions Emergency IT Support Humor Instant Messaging IT solutions iPhone Worker Commute Skype Employer Employee Relationship Vulnerability Cast Advertising Sports Current Events Excel Monitor Search NarrowBand Start Menu Computer Accessories Audit Keyboard Antivirus Tip of the week Scam Workers Reputation How to Files Document Management Mobile Bluetooth Computer Fan Loyalty Business Intelligence Hybrid Cloud Experience Knowledge Techology Windows Server 2008 Transportation Distributed Denial of Service Customer WiFi Colocation Chromecast Professional Services FENG Data Warehousing PDF Music Network Congestion Windows 7 Benefits Emails Tools Assessment IT Management USB Two-factor Authentication Uninterrupted Power Supply Mobile Computing Regulations Smart Technology Mouse Apps hacker eWaste Rootkit OneNote Television IT Plan Troubleshooting IT Consultant Legal Lithium-ion battery Content Environment Botnet Training Public Computer Hosted Solution Leadership Running Cable Mobile Device Servers Two Factor Authentication Netflix Streaming Media Education Root Cause Analysis Audiobook Going Green Travel Vendor Management Software Tips Content Filtering Robot Tech Support SharePoint Flash Relocation Charger Encryption Politics Laptop Hard Drives Data Recovery Google Docs Website Thank You Congratulations Webinar IT solutions Administration CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!