Posts Tagged With: Trojan

If There’s a RAT in Your Laptop, You Won’t Know Who’s Watching You….


It sounds like a virtual haunting, and it happens on your computer. File folders go missing. The mouse curser starts roaming around on its own. Pop up messages appear for no particular reason. The laptop shuts down without a command. After it restarts, the webcam light is on. But if you’re not using the computer in genreal, and the camera in particular, who is?
If you’re lucky your computer has viruses; if you’re not so lucky, your PC may have a RAT problem. A RAT infestation can lead to a whole new level of privacy violation.
Remote access tools (RATs) were developed to allow users to access their PCs away from the office—think advanced telecommuting—but a new generation of hackers is developing increasingly advanced RAT software that allows them to take over a computer owned by an innocent target—think you—and make it their “slave.” Once they’re in, they can spy on you through the webcam and listen into your conversations on the microphone, effectively turning your computer into a one-way mirror into your life.

“People would not have a clue it’s been installed on their PC as the methods now are getting more and more advanced,” says Black Shadow, a hacker contacted by TakePart through Hack Forums, a bulletin board. “Hackers use them for a few reasons: to spy on a person, to steal from their accounts, to build up a bot-net for DDS [distributed denial-of-service] attacks, or just for fun, to be nosy.”
A YouTuber who goes by the handle DaSheepherder posted a video on Hack Forums some 15 months ago complaining he’d been RATted by one of the members of the forum. “Whoever did it just deleted everything,” he said. “I have got, like, nothing, nothing left. All my intros and all my upcoming videos have been deleted. I’ll have to start from scratch making the intros and all that.”
Black Shadow saw the post and says he helped DaSheepherder retrieve the deleted files. “I cleaned up his PC, got rid of the RAT for him,” he wrote on Hack Forums. “[A]fter the kid I helped got hacked, I wanted to find a way to stop them, so I have produced a RAT Firewall. [N]ow it’s time to help people defend themselves.”
To detect a RAT takeover, says Black Shadow, “Look at your startup items. It will show [up] there for sure, unless it’s been programmed into the memory, then it will not be visible.
“Look at your task-manager at running processes, most RATS are set to run from these, it will always run from user name.”
And always, he says, “Check for your webcam light if it’s on.”
The snoop, and the consequences, coming from the other end of that webcam can be far more serious than losing a fledgling YouTube inventory if you’re living in a country embroiled in political unrest, insurrection or civil war.
Karim Taymour, a Syrian activist, told a reporter from Bloomberg that after he was arrested by the Assad regime, his interrogators showed him a “stack of more than 1,000 pages detailing his conversations and electronic files exchanged on Skype,” according to Reporters Without Borders.
“My computer was arrested before I was,” Taymour said.
In its annual “Enemies of the Internet” report released March 12, Reporters Without Borders found that “Internet content filtering is growing, but Internet surveillance is growing even more. Censors prefer to monitor dissidents’ online activities and contacts rather than try to prevent them from going online.”
Oppressive governments are like RATters: They like to watch.

Categories: Identity Theft Protection, Uncategorized | Tags: , , , , , , , , , , , , , , , | 2 Comments

Skype targeted by ‘worm’ malware infecting Windows PCs……


 

Skype, the internet communications platform, is being used by hackers to distribute a “worm” that infects Windows PCs.

When users click on an instant message saying “lol is this your new profile pic?” they unwittingly download a file containing a Trojan horse malware file.

This opens a backdoor allowing hackers to hijack infected PCs and recruit them into a “botnet army”.

Users can be locked out of their machines and held to ransom.

According to internet security specialist Sophos, the worm is a variant of the well-known “Dorkbot” worm which has been spread by social media platforms such as Facebook and Twitter.

When the worm infects a computer it sends out the “lol” message to the user’s contact list.

Unsuspecting recipients think the message has originated from someone they know and click on the link, thereby downloading the malware payload.

When users click on an instant message saying “lol is this your new profile pic?” they unwittingly download a file containing a Trojan horse malware file.

This opens a backdoor allowing hackers to hijack infected PCs and recruit them into a “botnet army”.

Users can be locked out of their machines and held to ransom.

According to internet security specialist Sophos, the worm is a variant of the well-known “Dorkbot” worm which has been spread by social media platforms such as Facebook and Twitter.

When the worm infects a computer it sends out the “lol” message to the user’s contact list.

Unsuspecting recipients think the message has originated from someone they know and click on the link, thereby downloading the malware payload.

Hijacked computers

Skype said in a statement: “Skype takes the user experience very seriously, particularly when it comes to security. We are aware of this malicious activity and are working quickly to mitigate its impact.

“We strongly recommend upgrading to the newest Skype version and applying updated security features on your computer.

“Additionally, following links – even when from your contacts – that look strange or are unexpected is not advisable.”

Botnets are often used to mount distributed denial of service (DDoS) attacks – forcing websites offline – to run spyware or to send out spam emails.

Publicity about the threat has made many users wary of clicking on strange-looking links posted via social networks, which may have prompted the perpetrators of this latest attack to switch tactics.

“The danger is, of course, that Skype users may be less in the habit of being suspicious about links sent to them than, say, Facebook users,” said Sophos’s senior technology consultant Graham Cluley.

Categories: Strange News | Tags: , , , , , , , , | Leave a comment

#1 Rated…Protect yourself today….


What is SpyHunter and How Does it Work? SpyHunter is a powerful, real-time anti-spyware application certified by West Coast Labs’ Checkmark Certification System and designed to assist the average computer user in protecting their PC from malicious threats. SpyHunter is automatically configured to give you optimal protection with limited interaction, so all you need to do is install it for immediate and ongoing protection.

As malware continues to evolve and become more sophisticated to avoid detection by anti-spyware/anti-virus programs, SpyHunter responds with advanced technology to stay one step ahead of today’s malware threats. SpyHunter offers additional customization capabilities to ensure every user is able to custom tailor SpyHunter to fit their specific needs.

SpyHunter has the ability to detect and remove rootkits, which are used to stealth install rogue anti-spyware programs and other trojans.

http://tinyurl.com/bwofgrk

Categories: Uncategorized | Tags: , , , , , | Leave a comment

Blog at WordPress.com.

mayanexplore.com

Riviera Maya Travel Guide

Cajun Food, Louisiana History, and a Little Lagniappe

Preservation of traditional River Road cuisine, Louisiana history & architecture, and the communities between Baton Rouge & NOLA

Jali Wanders

Wondering and Wandering

Southpaw Tracks

“If ever a time should come, when vain and aspiring men shall possess the highest seats in Government, our country will stand in need of its experienced patriots to prevent its ruin.” ~Samuel Adams

Pacific Paratrooper

This WordPress.com site is Pacific War era information

what's the formula?

Nurturing awesomeness: from the parents of celebrities, heroes, trailblazers and leaders

Tarheel Red

A Voice of Conservatism Living in Carolina Blue

cancer killing recipe

Just another WordPress.com site

dreamshadow59

A great WordPress.com site

Mike's Look at Life

Photography, memoirs, random thoughts.

Belle Grove Plantation Bed and Breakfast

Birthplace of James Madison and Southern Plantation

Letters for Michael

Lessons on being gay, of love, life and lots of it

Sunny Sleevez

Sun Protection & Green Info

Backcountry Tranquility

A journal about my travels and related experiences :)

LEANNE COLE

Art and Practice

Lukas Chodorowicz

Travel, culture and lifestyle experienced on my adventures around the world. All photos taken by me. Instagram: @colorspark

BunnyandPorkBelly

life is always sweeter and yummier through a lens. bunnyandporkbelly [at] gmail [dot] com

%d bloggers like this: